Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4038: CWE-94 Improper Control of Generation of Code ('Code Injection') in codewoogeek Back In Stock Notifier for WooCommerce | WooCommerce Waitlist Pro

0
Medium
VulnerabilityCVE-2024-4038cvecve-2024-4038cwe-94
Published: Thu May 09 2024 (05/09/2024, 20:03:40 UTC)
Source: CVE Database V5
Vendor/Project: codewoogeek
Product: Back In Stock Notifier for WooCommerce | WooCommerce Waitlist Pro

Description

CVE-2024-4038 is a medium severity vulnerability in the Back In Stock Notifier for WooCommerce | WooCommerce Waitlist Pro WordPress plugin, affecting all versions up to 5. 3. 1. It allows unauthenticated attackers to execute arbitrary shortcodes due to improper validation before calling do_shortcode. This code injection flaw (CWE-94) can lead to limited confidentiality and integrity impacts without requiring user interaction or authentication. Although no known exploits are currently in the wild, the vulnerability poses a risk to websites using this plugin, potentially enabling attackers to run malicious code within the WordPress environment. Organizations using this plugin should prioritize patching or applying mitigations to prevent exploitation. The threat primarily affects WooCommerce users worldwide, especially in countries with high WordPress and WooCommerce adoption. Given the network exploitable nature and no authentication needed, the vulnerability demands timely attention despite its medium CVSS score.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:26:29 UTC

Technical Analysis

CVE-2024-4038 is a code injection vulnerability classified under CWE-94 found in the Back In Stock Notifier for WooCommerce | WooCommerce Waitlist Pro plugin for WordPress. The flaw exists because the plugin improperly validates input before executing the WordPress do_shortcode function, which processes shortcodes. This improper validation allows unauthenticated attackers to supply arbitrary shortcode content that the plugin executes, effectively enabling arbitrary code execution within the context of the WordPress site. The vulnerability affects all versions up to and including 5.3.1. Since shortcodes can invoke PHP functions or other plugin features, this can lead to unauthorized actions such as data leakage, modification, or limited control over site behavior. The CVSS 3.1 base score is 6.5 (medium), reflecting network attack vector, no privileges required, no user interaction, and partial impact on confidentiality and integrity but no impact on availability. No public exploits or patches are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used in WooCommerce environments, which are popular in e-commerce websites built on WordPress, increasing the potential attack surface.

Potential Impact

The vulnerability allows unauthenticated remote attackers to execute arbitrary shortcodes, which can lead to unauthorized disclosure of sensitive information (confidentiality impact) and unauthorized modification of data or site behavior (integrity impact). While it does not directly impact availability, the ability to inject code can be leveraged to pivot attacks or escalate privileges. For organizations running WooCommerce stores with this plugin, exploitation could result in data breaches, defacement, or insertion of malicious content, undermining customer trust and causing financial and reputational damage. Since no authentication or user interaction is required, the attack surface is broad, increasing the likelihood of automated scanning and exploitation attempts. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate it, especially as threat actors often develop exploits after public disclosure. The impact is particularly significant for e-commerce businesses relying on this plugin for customer notifications and waitlist management.

Mitigation Recommendations

Organizations should immediately verify if they are using the Back In Stock Notifier for WooCommerce | WooCommerce Waitlist Pro plugin and identify the version in use. Since no official patch is currently available, temporary mitigations include disabling the plugin until a fix is released or restricting access to the affected shortcode execution functionality via web application firewall (WAF) rules or custom code that sanitizes or blocks suspicious shortcode inputs. Monitoring web server and application logs for unusual shortcode execution patterns or unexpected requests targeting the plugin can help detect exploitation attempts. Administrators should also ensure WordPress core, themes, and other plugins are up to date to reduce overall attack surface. Once a vendor patch or update is released, it should be applied promptly. Additionally, implementing the principle of least privilege for WordPress users and limiting plugin installation to trusted sources can reduce risk. Employing runtime application self-protection (RASP) or endpoint detection and response (EDR) tools may help detect and block exploitation attempts in real time.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-22T18:40:47.065Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b80b7ef31ef0b55603d

Added to database: 2/25/2026, 9:37:04 PM

Last enriched: 2/26/2026, 12:26:29 AM

Last updated: 2/26/2026, 11:21:55 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats