CVE-2024-4038: CWE-94 Improper Control of Generation of Code ('Code Injection') in codewoogeek Back In Stock Notifier for WooCommerce | WooCommerce Waitlist Pro
CVE-2024-4038 is a medium severity vulnerability in the Back In Stock Notifier for WooCommerce | WooCommerce Waitlist Pro WordPress plugin, affecting all versions up to 5. 3. 1. It allows unauthenticated attackers to execute arbitrary shortcodes due to improper validation before calling do_shortcode. This code injection flaw (CWE-94) can lead to limited confidentiality and integrity impacts without requiring user interaction or authentication. Although no known exploits are currently in the wild, the vulnerability poses a risk to websites using this plugin, potentially enabling attackers to run malicious code within the WordPress environment. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation. The threat primarily affects WooCommerce users worldwide, especially in countries with high WordPress and WooCommerce adoption. Given the network exploitable nature and no authentication needed, the vulnerability demands timely attention despite its medium CVSS score.
AI Analysis
Technical Summary
CVE-2024-4038 is a code injection vulnerability classified under CWE-94 found in the Back In Stock Notifier for WooCommerce | WooCommerce Waitlist Pro plugin for WordPress. The flaw exists because the plugin improperly validates input before executing the WordPress do_shortcode function, which processes shortcodes. This improper validation allows unauthenticated attackers to supply arbitrary shortcode content that the plugin executes, effectively enabling arbitrary code execution within the context of the WordPress site. The vulnerability affects all versions up to and including 5.3.1. Since shortcodes can invoke PHP functions or other plugin features, this can lead to unauthorized actions such as data leakage, modification, or limited control over site behavior. The CVSS 3.1 base score is 6.5 (medium), reflecting network attack vector, no privileges required, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. No public exploits or patches are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used in WooCommerce environments, which are popular in e-commerce websites built on WordPress, increasing the potential attack surface.
Potential Impact
The vulnerability allows unauthenticated remote attackers to execute arbitrary shortcodes, which can lead to unauthorized disclosure of sensitive information (confidentiality impact) and unauthorized modification of data or site behavior (integrity impact). While it does not directly impact availability, the ability to inject code can be leveraged to pivot attacks or escalate privileges. For organizations running WooCommerce stores with this plugin, exploitation could result in data breaches, defacement, or insertion of malicious content, undermining customer trust and causing financial and reputational damage. Since no authentication or user interaction is required, the attack surface is broad, increasing the likelihood of automated scanning and exploitation attempts. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate it, especially as threat actors often develop exploits after public disclosure. The impact is particularly significant for e-commerce businesses relying on this plugin for customer notifications and waitlist management.
Mitigation Recommendations
Organizations should immediately verify if they are using the Back In Stock Notifier for WooCommerce | WooCommerce Waitlist Pro plugin and identify the version in use. Since no official patch is currently available, temporary mitigations include disabling the plugin until a fix is released or restricting access to the affected shortcode execution functionality via web application firewall (WAF) rules or custom code that sanitizes or blocks suspicious shortcode inputs. Monitoring web server and application logs for unusual shortcode execution patterns or unexpected requests targeting the plugin can help detect exploitation attempts. Administrators should also ensure WordPress core, themes, and other plugins are up to date to reduce overall attack surface. Once a vendor patch or update is released, it should be applied promptly. Additionally, implementing the principle of least privilege for WordPress users and limiting plugin installation to trusted sources can reduce risk. Employing runtime application self-protection (RASP) or endpoint detection and response (EDR) tools may help detect and block exploitation attempts in real time.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, India, Brazil, Japan, Italy, Spain
CVE-2024-4038: CWE-94 Improper Control of Generation of Code ('Code Injection') in codewoogeek Back In Stock Notifier for WooCommerce | WooCommerce Waitlist Pro
Description
CVE-2024-4038 is a medium severity vulnerability in the Back In Stock Notifier for WooCommerce | WooCommerce Waitlist Pro WordPress plugin, affecting all versions up to 5. 3. 1. It allows unauthenticated attackers to execute arbitrary shortcodes due to improper validation before calling do_shortcode. This code injection flaw (CWE-94) can lead to limited confidentiality and integrity impacts without requiring user interaction or authentication. Although no known exploits are currently in the wild, the vulnerability poses a risk to websites using this plugin, potentially enabling attackers to run malicious code within the WordPress environment. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation. The threat primarily affects WooCommerce users worldwide, especially in countries with high WordPress and WooCommerce adoption. Given the network exploitable nature and no authentication needed, the vulnerability demands timely attention despite its medium CVSS score.
AI-Powered Analysis
Technical Analysis
CVE-2024-4038 is a code injection vulnerability classified under CWE-94 found in the Back In Stock Notifier for WooCommerce | WooCommerce Waitlist Pro plugin for WordPress. The flaw exists because the plugin improperly validates input before executing the WordPress do_shortcode function, which processes shortcodes. This improper validation allows unauthenticated attackers to supply arbitrary shortcode content that the plugin executes, effectively enabling arbitrary code execution within the context of the WordPress site. The vulnerability affects all versions up to and including 5.3.1. Since shortcodes can invoke PHP functions or other plugin features, this can lead to unauthorized actions such as data leakage, modification, or limited control over site behavior. The CVSS 3.1 base score is 6.5 (medium), reflecting network attack vector, no privileges required, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. No public exploits or patches are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used in WooCommerce environments, which are popular in e-commerce websites built on WordPress, increasing the potential attack surface.
Potential Impact
The vulnerability allows unauthenticated remote attackers to execute arbitrary shortcodes, which can lead to unauthorized disclosure of sensitive information (confidentiality impact) and unauthorized modification of data or site behavior (integrity impact). While it does not directly impact availability, the ability to inject code can be leveraged to pivot attacks or escalate privileges. For organizations running WooCommerce stores with this plugin, exploitation could result in data breaches, defacement, or insertion of malicious content, undermining customer trust and causing financial and reputational damage. Since no authentication or user interaction is required, the attack surface is broad, increasing the likelihood of automated scanning and exploitation attempts. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate it, especially as threat actors often develop exploits after public disclosure. The impact is particularly significant for e-commerce businesses relying on this plugin for customer notifications and waitlist management.
Mitigation Recommendations
Organizations should immediately verify if they are using the Back In Stock Notifier for WooCommerce | WooCommerce Waitlist Pro plugin and identify the version in use. Since no official patch is currently available, temporary mitigations include disabling the plugin until a fix is released or restricting access to the affected shortcode execution functionality via web application firewall (WAF) rules or custom code that sanitizes or blocks suspicious shortcode inputs. Monitoring web server and application logs for unusual shortcode execution patterns or unexpected requests targeting the plugin can help detect exploitation attempts. Administrators should also ensure WordPress core, themes, and other plugins are up to date to reduce overall attack surface. Once a vendor patch or update is released, it should be applied promptly. Additionally, implementing the principle of least privilege for WordPress users and limiting plugin installation to trusted sources can reduce risk. Employing runtime application self-protection (RASP) or endpoint detection and response (EDR) tools may help detect and block exploitation attempts in real time.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-04-22T18:40:47.065Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b80b7ef31ef0b55603d
Added to database: 2/25/2026, 9:37:04 PM
Last enriched: 2/26/2026, 12:26:29 AM
Last updated: 2/26/2026, 11:21:55 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.