CVE-2024-13793: CWE-94 Improper Control of Generation of Code ('Code Injection') in don-themes Wolmart | Multi-Vendor Marketplace WooCommerce Theme
The Wolmart | Multi-Vendor Marketplace WooCommerce Theme theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.8.11. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
AI Analysis
Technical Summary
CVE-2024-13793 is a high-severity vulnerability affecting the Wolmart | Multi-Vendor Marketplace WooCommerce Theme for WordPress, developed by don-themes. This vulnerability stems from improper control over code generation, specifically classified under CWE-94 (Improper Control of Generation of Code). The flaw allows unauthenticated attackers to execute arbitrary shortcodes via the do_shortcode function without proper validation. Since shortcodes in WordPress can execute PHP code or trigger various actions, this vulnerability can lead to arbitrary code execution within the context of the WordPress site. The vulnerability affects all versions up to and including 1.8.11 of the Wolmart theme. The CVSS 3.1 base score is 7.3, reflecting a high severity due to the network attack vector (no authentication or user interaction required), and impacts confidentiality, integrity, and availability of the affected systems. Although no known exploits are currently reported in the wild, the ease of exploitation combined with the unauthenticated access makes this a significant threat. The vulnerability arises because the theme does not properly validate user-supplied input before passing it to do_shortcode, enabling attackers to inject and execute arbitrary shortcodes that can manipulate site content, execute malicious PHP code, or escalate privileges within the WordPress environment. This can lead to data leakage, site defacement, malware deployment, or full site compromise.
Potential Impact
For European organizations using WordPress sites with the Wolmart Multi-Vendor Marketplace WooCommerce Theme, this vulnerability poses a critical risk. Exploitation could lead to unauthorized access to sensitive customer data, including personal and payment information, which is especially concerning under GDPR regulations. The ability to execute arbitrary code without authentication could allow attackers to manipulate e-commerce transactions, inject malicious scripts for further attacks (e.g., cryptojacking, phishing), or disrupt business operations by defacing websites or causing downtime. Given the multi-vendor marketplace nature of the theme, compromise could also affect multiple vendors and their customers, amplifying the impact. The breach of confidentiality and integrity could result in significant financial losses, reputational damage, and regulatory penalties for European businesses. Additionally, the availability impact could disrupt online sales channels critical for revenue generation.
Mitigation Recommendations
1. Immediate update: Organizations should upgrade the Wolmart theme to a version that patches this vulnerability as soon as it becomes available from don-themes. 2. Temporary mitigation: Until a patch is released, restrict access to the WordPress admin and theme files using web application firewalls (WAFs) or IP whitelisting to limit exposure to unauthenticated requests. 3. Input validation: Implement additional server-side input validation and sanitization for shortcode parameters, possibly via custom plugins or security modules, to block malicious shortcode injections. 4. Monitoring and detection: Deploy monitoring tools to detect unusual shortcode execution patterns or unauthorized changes in site content. 5. Principle of least privilege: Limit permissions of WordPress users and roles to reduce the potential impact of code execution. 6. Backup and recovery: Maintain regular backups of website data and configurations to enable rapid restoration in case of compromise. 7. Security plugins: Utilize reputable WordPress security plugins that can detect and block code injection attempts and provide real-time alerts. 8. Incident response planning: Prepare an incident response plan specific to WordPress environments to quickly address any exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-13793: CWE-94 Improper Control of Generation of Code ('Code Injection') in don-themes Wolmart | Multi-Vendor Marketplace WooCommerce Theme
Description
The Wolmart | Multi-Vendor Marketplace WooCommerce Theme theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.8.11. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
AI-Powered Analysis
Technical Analysis
CVE-2024-13793 is a high-severity vulnerability affecting the Wolmart | Multi-Vendor Marketplace WooCommerce Theme for WordPress, developed by don-themes. This vulnerability stems from improper control over code generation, specifically classified under CWE-94 (Improper Control of Generation of Code). The flaw allows unauthenticated attackers to execute arbitrary shortcodes via the do_shortcode function without proper validation. Since shortcodes in WordPress can execute PHP code or trigger various actions, this vulnerability can lead to arbitrary code execution within the context of the WordPress site. The vulnerability affects all versions up to and including 1.8.11 of the Wolmart theme. The CVSS 3.1 base score is 7.3, reflecting a high severity due to the network attack vector (no authentication or user interaction required), and impacts confidentiality, integrity, and availability of the affected systems. Although no known exploits are currently reported in the wild, the ease of exploitation combined with the unauthenticated access makes this a significant threat. The vulnerability arises because the theme does not properly validate user-supplied input before passing it to do_shortcode, enabling attackers to inject and execute arbitrary shortcodes that can manipulate site content, execute malicious PHP code, or escalate privileges within the WordPress environment. This can lead to data leakage, site defacement, malware deployment, or full site compromise.
Potential Impact
For European organizations using WordPress sites with the Wolmart Multi-Vendor Marketplace WooCommerce Theme, this vulnerability poses a critical risk. Exploitation could lead to unauthorized access to sensitive customer data, including personal and payment information, which is especially concerning under GDPR regulations. The ability to execute arbitrary code without authentication could allow attackers to manipulate e-commerce transactions, inject malicious scripts for further attacks (e.g., cryptojacking, phishing), or disrupt business operations by defacing websites or causing downtime. Given the multi-vendor marketplace nature of the theme, compromise could also affect multiple vendors and their customers, amplifying the impact. The breach of confidentiality and integrity could result in significant financial losses, reputational damage, and regulatory penalties for European businesses. Additionally, the availability impact could disrupt online sales channels critical for revenue generation.
Mitigation Recommendations
1. Immediate update: Organizations should upgrade the Wolmart theme to a version that patches this vulnerability as soon as it becomes available from don-themes. 2. Temporary mitigation: Until a patch is released, restrict access to the WordPress admin and theme files using web application firewalls (WAFs) or IP whitelisting to limit exposure to unauthenticated requests. 3. Input validation: Implement additional server-side input validation and sanitization for shortcode parameters, possibly via custom plugins or security modules, to block malicious shortcode injections. 4. Monitoring and detection: Deploy monitoring tools to detect unusual shortcode execution patterns or unauthorized changes in site content. 5. Principle of least privilege: Limit permissions of WordPress users and roles to reduce the potential impact of code execution. 6. Backup and recovery: Maintain regular backups of website data and configurations to enable rapid restoration in case of compromise. 7. Security plugins: Utilize reputable WordPress security plugins that can detect and block code injection attempts and provide real-time alerts. 8. Incident response planning: Prepare an incident response plan specific to WordPress environments to quickly address any exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-29T20:28:22.540Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd858d
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 7/5/2025, 6:43:01 AM
Last updated: 7/30/2025, 12:33:15 AM
Views: 13
Related Threats
CVE-2025-9022: SQL Injection in SourceCodester Online Bank Management System
MediumCVE-2025-9021: SQL Injection in SourceCodester Online Bank Management System
MediumCVE-2025-9020: Use After Free in PX4 PX4-Autopilot
LowCVE-2025-8604: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wptb WP Table Builder – WordPress Table Plugin
MediumCVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.