Skip to main content

CVE-2024-13793: CWE-94 Improper Control of Generation of Code ('Code Injection') in don-themes Wolmart | Multi-Vendor Marketplace WooCommerce Theme

High
VulnerabilityCVE-2024-13793cvecve-2024-13793cwe-94
Published: Thu May 08 2025 (05/08/2025, 04:21:33 UTC)
Source: CVE
Vendor/Project: don-themes
Product: Wolmart | Multi-Vendor Marketplace WooCommerce Theme

Description

The Wolmart | Multi-Vendor Marketplace WooCommerce Theme theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.8.11. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

AI-Powered Analysis

AILast updated: 07/05/2025, 06:43:01 UTC

Technical Analysis

CVE-2024-13793 is a high-severity vulnerability affecting the Wolmart | Multi-Vendor Marketplace WooCommerce Theme for WordPress, developed by don-themes. This vulnerability stems from improper control over code generation, specifically classified under CWE-94 (Improper Control of Generation of Code). The flaw allows unauthenticated attackers to execute arbitrary shortcodes via the do_shortcode function without proper validation. Since shortcodes in WordPress can execute PHP code or trigger various actions, this vulnerability can lead to arbitrary code execution within the context of the WordPress site. The vulnerability affects all versions up to and including 1.8.11 of the Wolmart theme. The CVSS 3.1 base score is 7.3, reflecting a high severity due to the network attack vector (no authentication or user interaction required), and impacts confidentiality, integrity, and availability of the affected systems. Although no known exploits are currently reported in the wild, the ease of exploitation combined with the unauthenticated access makes this a significant threat. The vulnerability arises because the theme does not properly validate user-supplied input before passing it to do_shortcode, enabling attackers to inject and execute arbitrary shortcodes that can manipulate site content, execute malicious PHP code, or escalate privileges within the WordPress environment. This can lead to data leakage, site defacement, malware deployment, or full site compromise.

Potential Impact

For European organizations using WordPress sites with the Wolmart Multi-Vendor Marketplace WooCommerce Theme, this vulnerability poses a critical risk. Exploitation could lead to unauthorized access to sensitive customer data, including personal and payment information, which is especially concerning under GDPR regulations. The ability to execute arbitrary code without authentication could allow attackers to manipulate e-commerce transactions, inject malicious scripts for further attacks (e.g., cryptojacking, phishing), or disrupt business operations by defacing websites or causing downtime. Given the multi-vendor marketplace nature of the theme, compromise could also affect multiple vendors and their customers, amplifying the impact. The breach of confidentiality and integrity could result in significant financial losses, reputational damage, and regulatory penalties for European businesses. Additionally, the availability impact could disrupt online sales channels critical for revenue generation.

Mitigation Recommendations

1. Immediate update: Organizations should upgrade the Wolmart theme to a version that patches this vulnerability as soon as it becomes available from don-themes. 2. Temporary mitigation: Until a patch is released, restrict access to the WordPress admin and theme files using web application firewalls (WAFs) or IP whitelisting to limit exposure to unauthenticated requests. 3. Input validation: Implement additional server-side input validation and sanitization for shortcode parameters, possibly via custom plugins or security modules, to block malicious shortcode injections. 4. Monitoring and detection: Deploy monitoring tools to detect unusual shortcode execution patterns or unauthorized changes in site content. 5. Principle of least privilege: Limit permissions of WordPress users and roles to reduce the potential impact of code execution. 6. Backup and recovery: Maintain regular backups of website data and configurations to enable rapid restoration in case of compromise. 7. Security plugins: Utilize reputable WordPress security plugins that can detect and block code injection attempts and provide real-time alerts. 8. Incident response planning: Prepare an incident response plan specific to WordPress environments to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-29T20:28:22.540Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd858d

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 6:43:01 AM

Last updated: 7/30/2025, 12:33:15 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats