Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34763: Missing Authorization in Saleswonder Team: Tobias Builder for WooCommerce reviews shortcodes – ReviewShort

0
Unknown
VulnerabilityCVE-2024-34763cvecve-2024-34763
Published: Tue Jun 11 2024 (06/11/2024, 16:57:37 UTC)
Source: CVE Database V5
Vendor/Project: Saleswonder Team: Tobias
Product: Builder for WooCommerce reviews shortcodes – ReviewShort

Description

Missing Authorization vulnerability in Saleswonder Team: Tobias Builder for WooCommerce reviews shortcodes – ReviewShort woo-product-reviews-shortcode.This issue affects Builder for WooCommerce reviews shortcodes – ReviewShort: from n/a through <= 1.01.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 04:49:23 UTC

Technical Analysis

CVE-2024-34763 identifies a missing authorization vulnerability in the Saleswonder Team's Tobias Builder for WooCommerce reviews shortcodes plugin, known as ReviewShort. This plugin is designed to enhance WooCommerce product review displays by providing shortcode functionality. The vulnerability exists in versions up to 1.01.5 and involves a failure to properly enforce authorization checks when handling review shortcodes. This means that unauthenticated or unauthorized users may be able to invoke shortcode-related functions that should be restricted, potentially allowing them to view, modify, or manipulate review data or related content without permission. The root cause is an absence of access control validation in the plugin's code paths responsible for processing review shortcodes. While no public exploits have been reported yet, the flaw could be leveraged by attackers to undermine the integrity and confidentiality of review information, which can affect customer trust and site reputation. The vulnerability does not require user interaction or authentication, increasing the risk of exploitation. The plugin is used within WooCommerce, a widely adopted e-commerce platform, making the vulnerability relevant to many online stores globally. No official patches or updates have been linked yet, so users must monitor vendor advisories closely.

Potential Impact

The missing authorization vulnerability in the ReviewShort plugin can have several impacts on affected organizations. Unauthorized access to review shortcode functionality may allow attackers to view sensitive customer review data or manipulate review content, potentially misleading customers or damaging brand reputation. This can erode customer trust and affect sales. Additionally, unauthorized modification of reviews could be used to inject malicious content or disrupt the normal operation of e-commerce sites, impacting availability and integrity. Since WooCommerce is a popular e-commerce platform, many online retailers worldwide could be exposed, especially those using this specific plugin. The vulnerability could also be leveraged as a foothold for further attacks within the website environment, including privilege escalation or data exfiltration. Although no known exploits are currently active, the ease of exploitation due to missing authorization checks and lack of authentication requirements increases the risk. The overall impact includes potential loss of confidentiality, integrity, and availability of review-related data and associated business consequences.

Mitigation Recommendations

To mitigate CVE-2024-34763, organizations should take the following specific actions: 1) Immediately check for and apply any official patches or updates released by the Saleswonder Team for the Tobias Builder for WooCommerce reviews shortcodes plugin. 2) If no patch is available, consider temporarily disabling the ReviewShort plugin or removing the affected shortcode functionality until a fix is released. 3) Conduct a thorough code review and implement custom access control checks around the shortcode processing functions to ensure only authorized users can invoke them. 4) Monitor web server and application logs for unusual or unauthorized access attempts related to review shortcodes. 5) Employ web application firewalls (WAFs) with custom rules to block suspicious requests targeting the vulnerable shortcode endpoints. 6) Educate site administrators on the risks of unauthorized shortcode usage and enforce strict user role permissions within WooCommerce. 7) Regularly audit installed plugins and remove any that are unnecessary or unsupported to reduce attack surface. 8) Maintain up-to-date backups of site data to enable recovery in case of compromise. These steps go beyond generic advice by focusing on immediate containment, custom access control, and proactive monitoring specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-05-08T12:03:07.438Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7434e6bfc5ba1def6427

Added to database: 4/1/2026, 7:38:28 PM

Last enriched: 4/2/2026, 4:49:23 AM

Last updated: 4/4/2026, 8:17:21 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses