CVE-2024-13747: CWE-862 Missing Authorization in CidCode WooMail - WooCommerce Email Customizer
CVE-2024-13747 is a medium severity vulnerability in the WooMail - WooCommerce Email Customizer WordPress plugin that allows authenticated users with Subscriber-level access or higher to perform unauthorized SQL injection via the 'template_delete_saved' function due to missing authorization checks. This flaw affects all versions up to 3. 0. 34 and does not require user interaction. Exploitation can lead to data integrity compromise but does not impact confidentiality or availability directly. No known exploits are currently reported in the wild. Organizations using WooCommerce with this plugin should prioritize patching or implementing strict access controls to mitigate risk. The vulnerability is network exploitable with low attack complexity but limited to authenticated users. Countries with high WooCommerce adoption and significant e-commerce activity are most at risk. Immediate mitigation involves restricting plugin access and monitoring for suspicious database activity until a patch is available.
AI Analysis
Technical Summary
CVE-2024-13747 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WooMail - WooCommerce Email Customizer plugin for WordPress, affecting all versions up to and including 3.0.34. The issue arises because the 'template_delete_saved' function lacks proper capability checks, allowing authenticated users with as low as Subscriber-level privileges to inject SQL code into an existing post deletion query. This vulnerability enables attackers to manipulate database queries without proper authorization, potentially modifying or corrupting data. The vulnerability is exploitable remotely over the network without user interaction, requiring only authenticated access. The CVSS v3.1 score is 4.3 (medium), reflecting that while the attack vector is network-based and requires low privileges, the impact is limited to integrity loss without affecting confidentiality or availability. No patches or known exploits are currently reported, but the risk remains significant due to the widespread use of WooCommerce and the plugin in e-commerce environments. The vulnerability could be leveraged to alter or delete data improperly, undermining trust in transactional or email customization data within affected WordPress sites.
Potential Impact
The primary impact of CVE-2024-13747 is unauthorized modification of data integrity within WordPress sites using the WooMail plugin. Attackers with minimal privileges (Subscriber-level) can inject SQL commands to alter or delete data related to email templates or posts, potentially disrupting business communications or corrupting stored information. Although confidentiality and availability are not directly affected, the integrity compromise can lead to misinformation, operational disruptions, or further exploitation if combined with other vulnerabilities. For e-commerce sites relying on WooCommerce and WooMail, this could result in incorrect order notifications, loss of customer trust, or compliance issues. The medium severity reflects the limited scope of exploitation but acknowledges the risk posed by the ease of access and potential for data manipulation. Organizations worldwide with active WooCommerce deployments are at risk, especially those with large subscriber bases or less restrictive user role management.
Mitigation Recommendations
1. Immediately restrict access to the WooMail plugin functions by limiting Subscriber-level user capabilities or upgrading user role permissions to prevent unauthorized access. 2. Monitor database logs and WordPress activity logs for unusual deletion or modification queries related to email templates or posts. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'template_delete_saved' function. 4. Regularly audit user roles and permissions within WordPress to ensure minimal privilege principles are enforced. 5. If possible, disable or remove the WooMail plugin until a security patch or update is released by the vendor. 6. Stay updated with vendor announcements and apply patches promptly once available. 7. Employ database-level protections such as prepared statements or parameterized queries if custom modifications are made to the plugin. 8. Conduct penetration testing focusing on authenticated user privilege escalation and SQL injection vectors to identify residual risks.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, India, Brazil, Japan, Italy, Spain
CVE-2024-13747: CWE-862 Missing Authorization in CidCode WooMail - WooCommerce Email Customizer
Description
CVE-2024-13747 is a medium severity vulnerability in the WooMail - WooCommerce Email Customizer WordPress plugin that allows authenticated users with Subscriber-level access or higher to perform unauthorized SQL injection via the 'template_delete_saved' function due to missing authorization checks. This flaw affects all versions up to 3. 0. 34 and does not require user interaction. Exploitation can lead to data integrity compromise but does not impact confidentiality or availability directly. No known exploits are currently reported in the wild. Organizations using WooCommerce with this plugin should prioritize patching or implementing strict access controls to mitigate risk. The vulnerability is network exploitable with low attack complexity but limited to authenticated users. Countries with high WooCommerce adoption and significant e-commerce activity are most at risk. Immediate mitigation involves restricting plugin access and monitoring for suspicious database activity until a patch is available.
AI-Powered Analysis
Technical Analysis
CVE-2024-13747 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WooMail - WooCommerce Email Customizer plugin for WordPress, affecting all versions up to and including 3.0.34. The issue arises because the 'template_delete_saved' function lacks proper capability checks, allowing authenticated users with as low as Subscriber-level privileges to inject SQL code into an existing post deletion query. This vulnerability enables attackers to manipulate database queries without proper authorization, potentially modifying or corrupting data. The vulnerability is exploitable remotely over the network without user interaction, requiring only authenticated access. The CVSS v3.1 score is 4.3 (medium), reflecting that while the attack vector is network-based and requires low privileges, the impact is limited to integrity loss without affecting confidentiality or availability. No patches or known exploits are currently reported, but the risk remains significant due to the widespread use of WooCommerce and the plugin in e-commerce environments. The vulnerability could be leveraged to alter or delete data improperly, undermining trust in transactional or email customization data within affected WordPress sites.
Potential Impact
The primary impact of CVE-2024-13747 is unauthorized modification of data integrity within WordPress sites using the WooMail plugin. Attackers with minimal privileges (Subscriber-level) can inject SQL commands to alter or delete data related to email templates or posts, potentially disrupting business communications or corrupting stored information. Although confidentiality and availability are not directly affected, the integrity compromise can lead to misinformation, operational disruptions, or further exploitation if combined with other vulnerabilities. For e-commerce sites relying on WooCommerce and WooMail, this could result in incorrect order notifications, loss of customer trust, or compliance issues. The medium severity reflects the limited scope of exploitation but acknowledges the risk posed by the ease of access and potential for data manipulation. Organizations worldwide with active WooCommerce deployments are at risk, especially those with large subscriber bases or less restrictive user role management.
Mitigation Recommendations
1. Immediately restrict access to the WooMail plugin functions by limiting Subscriber-level user capabilities or upgrading user role permissions to prevent unauthorized access. 2. Monitor database logs and WordPress activity logs for unusual deletion or modification queries related to email templates or posts. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'template_delete_saved' function. 4. Regularly audit user roles and permissions within WordPress to ensure minimal privilege principles are enforced. 5. If possible, disable or remove the WooMail plugin until a security patch or update is released by the vendor. 6. Stay updated with vendor announcements and apply patches promptly once available. 7. Employ database-level protections such as prepared statements or parameterized queries if custom modifications are made to the plugin. 8. Conduct penetration testing focusing on authenticated user privilege escalation and SQL injection vectors to identify residual risks.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-27T20:46:57.231Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e6cb7ef31ef0b5a0671
Added to database: 2/25/2026, 9:49:32 PM
Last enriched: 2/25/2026, 10:15:07 PM
Last updated: 2/25/2026, 10:53:40 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27577: CWE-94: Improper Control of Generation of Code ('Code Injection') in n8n-io n8n
CriticalCVE-2026-27497: CWE-94: Improper Control of Generation of Code ('Code Injection') in n8n-io n8n
CriticalCVE-2026-27495: CWE-94: Improper Control of Generation of Code ('Code Injection') in n8n-io n8n
CriticalCVE-2026-27494: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in n8n-io n8n
HighCVE-2026-27493: CWE-94: Improper Control of Generation of Code ('Code Injection') in n8n-io n8n
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.