Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3047: CWE-918 Server-Side Request Forgery (SSRF) in wpovernight PDF Invoices & Packing Slips for WooCommerce

0
High
VulnerabilityCVE-2024-3047cvecve-2024-3047cwe-918
Published: Thu May 02 2024 (05/02/2024, 16:51:50 UTC)
Source: CVE Database V5
Vendor/Project: wpovernight
Product: PDF Invoices & Packing Slips for WooCommerce

Description

CVE-2024-3047 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in the PDF Invoices & Packing Slips for WooCommerce WordPress plugin, affecting all versions up to 3. 8. 0. It allows unauthenticated attackers to make arbitrary web requests from the server via the transform() function, potentially accessing or modifying internal services. The vulnerability does not require user interaction or authentication, increasing its risk. Exploitation can lead to partial confidentiality and integrity loss of internal data but does not directly impact availability. No public exploits are currently known. Organizations using this plugin should prioritize patching or applying mitigations to prevent internal network reconnaissance or data manipulation. Countries with significant WooCommerce and WordPress usage, especially those with large e-commerce sectors, are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:01:19 UTC

Technical Analysis

CVE-2024-3047 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, found in the PDF Invoices & Packing Slips for WooCommerce plugin for WordPress. This vulnerability exists in versions up to and including 3.8.0, specifically within the transform() function. SSRF vulnerabilities enable attackers to abuse a vulnerable server to send crafted requests to arbitrary locations, including internal network services that are otherwise inaccessible externally. In this case, the vulnerability allows unauthenticated attackers to induce the web application to perform HTTP requests to arbitrary URLs. This can be leveraged to query internal services, potentially exposing sensitive information or modifying internal data if those services accept such requests. The vulnerability has a CVSS 3.1 base score of 7.2, indicating high severity, with an attack vector of network (remote), low attack complexity, no privileges required, and no user interaction needed. The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable component, and the impact includes low confidentiality and integrity loss but no availability impact. No public exploit code is currently known, but the risk remains significant due to the ease of exploitation and the unauthenticated nature of the attack. The plugin is widely used in WooCommerce-based e-commerce sites, which are prevalent globally, increasing the potential attack surface.

Potential Impact

The SSRF vulnerability can have serious consequences for organizations running WooCommerce sites with the affected plugin. Attackers can leverage this flaw to perform reconnaissance on internal network resources, potentially discovering sensitive internal services such as databases, metadata services in cloud environments, or internal APIs. This can lead to unauthorized disclosure of confidential information or unauthorized modification of internal data if the internal services are vulnerable. Although the vulnerability does not directly affect availability, the confidentiality and integrity impacts can facilitate further attacks, including lateral movement within the network or data exfiltration. E-commerce sites are particularly sensitive due to the potential exposure of customer data and transactional information. The unauthenticated nature of the vulnerability increases the risk of automated scanning and exploitation attempts. Organizations without proper network segmentation or internal service protections are at higher risk.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the PDF Invoices & Packing Slips for WooCommerce plugin to a version that addresses the SSRF issue once available. Until a patch is released, administrators should consider disabling or restricting the plugin’s functionality that invokes the transform() function if feasible. Implement network-level controls to restrict outbound HTTP requests from the web server to only trusted destinations, thereby limiting the ability of SSRF to reach internal services. Employ Web Application Firewalls (WAFs) with rules designed to detect and block SSRF attack patterns targeting this plugin. Review and harden internal services to require authentication and validate incoming requests to prevent unauthorized access or modification. Monitor logs for unusual outbound requests originating from the web application. Additionally, conduct internal network segmentation to isolate critical services from the web server environment. Regularly audit plugin usage and maintain an inventory of WordPress plugins to ensure timely updates and vulnerability management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-03-28T15:58:07.770Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c8ab7ef31ef0b566133

Added to database: 2/25/2026, 9:41:30 PM

Last enriched: 2/26/2026, 6:01:19 AM

Last updated: 2/26/2026, 12:45:52 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats