CVE-2024-3047: CWE-918 Server-Side Request Forgery (SSRF) in wpovernight PDF Invoices & Packing Slips for WooCommerce
CVE-2024-3047 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in the PDF Invoices & Packing Slips for WooCommerce WordPress plugin, affecting all versions up to 3. 8. 0. It allows unauthenticated attackers to make arbitrary web requests from the server via the transform() function, potentially accessing or modifying internal services. The vulnerability does not require user interaction or authentication, increasing its risk. Exploitation can lead to partial confidentiality and integrity loss of internal data but does not directly impact availability. No public exploits are currently known. Organizations using this plugin should prioritize patching or applying mitigations to prevent internal network reconnaissance or data manipulation. Countries with significant WooCommerce and WordPress usage, especially those with large e-commerce sectors, are at higher risk.
AI Analysis
Technical Summary
CVE-2024-3047 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the PDF Invoices & Packing Slips for WooCommerce plugin for WordPress. This vulnerability exists in versions up to and including 3.8.0, specifically within the transform() function. SSRF vulnerabilities enable attackers to abuse a vulnerable server to send crafted requests to arbitrary locations, including internal network services that are otherwise inaccessible externally. In this case, the vulnerability allows unauthenticated attackers to induce the web application to perform HTTP requests to arbitrary URLs. This can be leveraged to query internal services, potentially exposing sensitive information or modifying internal data if those services accept such requests. The vulnerability has a CVSS 3.1 base score of 7.2, indicating high severity, with an attack vector of network (remote), low attack complexity, no privileges required, and no user interaction needed. The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable component, and the impact includes low confidentiality and integrity loss but no availability impact. No public exploit code is currently known, but the risk remains significant due to the ease of exploitation and the unauthenticated nature of the attack. The plugin is widely used in WooCommerce-based e-commerce sites, which are prevalent globally, increasing the potential attack surface.
Potential Impact
The SSRF vulnerability can have serious consequences for organizations running WooCommerce sites with the affected plugin. Attackers can leverage this flaw to perform reconnaissance on internal network resources, potentially discovering sensitive internal services such as databases, metadata services in cloud environments, or internal APIs. This can lead to unauthorized disclosure of confidential information or unauthorized modification of internal data if the internal services are vulnerable. Although the vulnerability does not directly affect availability, the confidentiality and integrity impacts can facilitate further attacks, including lateral movement within the network or data exfiltration. E-commerce sites are particularly sensitive due to the potential exposure of customer data and transactional information. The unauthenticated nature of the vulnerability increases the risk of automated scanning and exploitation attempts. Organizations without proper network segmentation or internal service protections are at higher risk.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the PDF Invoices & Packing Slips for WooCommerce plugin to a version that addresses the SSRF issue once available. Until a patch is released, administrators should consider disabling or restricting the plugin’s functionality that invokes the transform() function if feasible. Implement network-level controls to restrict outbound HTTP requests from the web server to only trusted destinations, thereby limiting the ability of SSRF to reach internal services. Employ Web Application Firewalls (WAFs) with rules designed to detect and block SSRF attack patterns targeting this plugin. Review and harden internal services to require authentication and validate incoming requests to prevent unauthorized access or modification. Monitor logs for unusual outbound requests originating from the web application. Additionally, conduct internal network segmentation to isolate critical services from the web server environment. Regularly audit plugin usage and maintain an inventory of WordPress plugins to ensure timely updates and vulnerability management.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan, Italy, Spain
CVE-2024-3047: CWE-918 Server-Side Request Forgery (SSRF) in wpovernight PDF Invoices & Packing Slips for WooCommerce
Description
CVE-2024-3047 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in the PDF Invoices & Packing Slips for WooCommerce WordPress plugin, affecting all versions up to 3. 8. 0. It allows unauthenticated attackers to make arbitrary web requests from the server via the transform() function, potentially accessing or modifying internal services. The vulnerability does not require user interaction or authentication, increasing its risk. Exploitation can lead to partial confidentiality and integrity loss of internal data but does not directly impact availability. No public exploits are currently known. Organizations using this plugin should prioritize patching or applying mitigations to prevent internal network reconnaissance or data manipulation. Countries with significant WooCommerce and WordPress usage, especially those with large e-commerce sectors, are at higher risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-3047 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the PDF Invoices & Packing Slips for WooCommerce plugin for WordPress. This vulnerability exists in versions up to and including 3.8.0, specifically within the transform() function. SSRF vulnerabilities enable attackers to abuse a vulnerable server to send crafted requests to arbitrary locations, including internal network services that are otherwise inaccessible externally. In this case, the vulnerability allows unauthenticated attackers to induce the web application to perform HTTP requests to arbitrary URLs. This can be leveraged to query internal services, potentially exposing sensitive information or modifying internal data if those services accept such requests. The vulnerability has a CVSS 3.1 base score of 7.2, indicating high severity, with an attack vector of network (remote), low attack complexity, no privileges required, and no user interaction needed. The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable component, and the impact includes low confidentiality and integrity loss but no availability impact. No public exploit code is currently known, but the risk remains significant due to the ease of exploitation and the unauthenticated nature of the attack. The plugin is widely used in WooCommerce-based e-commerce sites, which are prevalent globally, increasing the potential attack surface.
Potential Impact
The SSRF vulnerability can have serious consequences for organizations running WooCommerce sites with the affected plugin. Attackers can leverage this flaw to perform reconnaissance on internal network resources, potentially discovering sensitive internal services such as databases, metadata services in cloud environments, or internal APIs. This can lead to unauthorized disclosure of confidential information or unauthorized modification of internal data if the internal services are vulnerable. Although the vulnerability does not directly affect availability, the confidentiality and integrity impacts can facilitate further attacks, including lateral movement within the network or data exfiltration. E-commerce sites are particularly sensitive due to the potential exposure of customer data and transactional information. The unauthenticated nature of the vulnerability increases the risk of automated scanning and exploitation attempts. Organizations without proper network segmentation or internal service protections are at higher risk.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the PDF Invoices & Packing Slips for WooCommerce plugin to a version that addresses the SSRF issue once available. Until a patch is released, administrators should consider disabling or restricting the plugin’s functionality that invokes the transform() function if feasible. Implement network-level controls to restrict outbound HTTP requests from the web server to only trusted destinations, thereby limiting the ability of SSRF to reach internal services. Employ Web Application Firewalls (WAFs) with rules designed to detect and block SSRF attack patterns targeting this plugin. Review and harden internal services to require authentication and validate incoming requests to prevent unauthorized access or modification. Monitor logs for unusual outbound requests originating from the web application. Additionally, conduct internal network segmentation to isolate critical services from the web server environment. Regularly audit plugin usage and maintain an inventory of WordPress plugins to ensure timely updates and vulnerability management.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-03-28T15:58:07.770Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c8ab7ef31ef0b566133
Added to database: 2/25/2026, 9:41:30 PM
Last enriched: 2/26/2026, 6:01:19 AM
Last updated: 2/26/2026, 12:45:52 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14343: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dokuzsoft Technology Ltd. E-Commerce Product
HighCVE-2026-1198: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Simple SA Simple.ERP
HighCVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.