Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47634: Cross-Site Request Forgery (CSRF) in Streamline CartBounty – Save and recover abandoned carts for WooCommerce

0
Unknown
VulnerabilityCVE-2024-47634cvecve-2024-47634
Published: Sun Oct 20 2024 (10/20/2024, 10:29:41 UTC)
Source: CVE Database V5
Vendor/Project: Streamline
Product: CartBounty – Save and recover abandoned carts for WooCommerce

Description

Cross-Site Request Forgery (CSRF) vulnerability in Streamline CartBounty – Save and recover abandoned carts for WooCommerce woo-save-abandoned-carts allows Cross Site Request Forgery.This issue affects CartBounty – Save and recover abandoned carts for WooCommerce: from n/a through <= 8.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 06:22:54 UTC

Technical Analysis

The vulnerability identified as CVE-2024-47634 is a Cross-Site Request Forgery (CSRF) issue in the Streamline CartBounty plugin for WooCommerce, which is designed to save and recover abandoned shopping carts. The flaw exists in versions up to and including 8.2, allowing attackers to craft malicious web requests that, when executed by an authenticated WooCommerce user, can perform unauthorized actions related to abandoned cart data. CSRF attacks exploit the trust a web application has in a user's browser by sending unauthorized commands without the user's explicit consent, often through social engineering techniques such as malicious links or embedded scripts on third-party websites. This vulnerability does not require the attacker to have direct access to the victim’s credentials, only that the victim is logged into the WooCommerce site. The absence of a CVSS score indicates that the vulnerability has not yet been formally scored, but the technical details confirm the issue is publicly disclosed and published as of October 20, 2024. No known exploits have been reported in the wild, but the risk remains significant due to the plugin's role in managing sensitive e-commerce cart data and the potential for disruption or data manipulation. The vulnerability could lead to unauthorized changes in cart recovery processes, potentially affecting sales, customer experience, and data integrity. The plugin’s widespread use in WooCommerce stores globally increases the attack surface, especially for businesses relying heavily on abandoned cart recovery to boost revenue. The lack of patch links suggests that a fix may still be pending or in development, emphasizing the need for immediate mitigation steps by administrators.

Potential Impact

The impact of this CSRF vulnerability can be substantial for organizations operating WooCommerce-based e-commerce platforms using the CartBounty plugin. Attackers could manipulate abandoned cart data, potentially causing loss of sales opportunities, customer confusion, or fraudulent cart recoveries. This undermines the integrity of the shopping experience and could erode customer trust. Additionally, unauthorized actions performed via CSRF could disrupt business workflows, leading to operational inefficiencies and increased support costs. The vulnerability could also be leveraged as part of a broader attack chain to compromise user accounts or escalate privileges if combined with other vulnerabilities. Given the plugin’s role in managing sensitive transactional data, the confidentiality and integrity of customer information could be at risk. The ease of exploitation—requiring only that a victim be logged in and visit a malicious site—raises the likelihood of successful attacks. Organizations worldwide that rely on WooCommerce and this plugin for revenue-critical functions face potential financial and reputational damage if the vulnerability is exploited.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first monitor for official patches or updates from the Streamline CartBounty plugin developers and apply them promptly once available. In the absence of an immediate patch, administrators should implement strict anti-CSRF protections, such as verifying CSRF tokens on all state-changing requests within the plugin’s codebase. Reviewing and hardening user session management and ensuring that sensitive actions require explicit user confirmation can reduce risk. Web application firewalls (WAFs) can be configured to detect and block suspicious cross-site requests targeting the plugin endpoints. Additionally, educating users about the risks of clicking on untrusted links while logged into e-commerce sites can help reduce the attack surface. Regular security audits and penetration testing focused on the WooCommerce environment and its plugins will help identify and remediate similar vulnerabilities proactively. Finally, consider temporarily disabling or limiting the plugin’s functionality if a patch is not immediately available and the risk is deemed unacceptable.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-09-30T11:16:50.531Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd74a4e6bfc5ba1def84c4

Added to database: 4/1/2026, 7:40:20 PM

Last enriched: 4/2/2026, 6:22:54 AM

Last updated: 4/6/2026, 9:10:35 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses