Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6365: CWE-94 Improper Control of Generation of Code ('Code Injection') in woobewoo Product Table by WBW

0
Critical
VulnerabilityCVE-2024-6365cvecve-2024-6365cwe-94
Published: Tue Jul 09 2024 (07/09/2024, 03:33:03 UTC)
Source: CVE Database V5
Vendor/Project: woobewoo
Product: Product Table by WBW

Description

CVE-2024-6365 is a critical remote code execution vulnerability in the WordPress plugin Product Table by WBW, affecting all versions up to 2. 0. 1. The flaw exists in the 'saveCustomTitle' function due to missing authorization and lack of input sanitization in languages/customTitle. php, allowing unauthenticated attackers to execute arbitrary code on the server. This vulnerability has a CVSS score of 9. 8, indicating a high impact on confidentiality, integrity, and availability without requiring authentication or user interaction. Although no known exploits are currently reported in the wild, the ease of exploitation and severity make it a significant threat to WordPress sites using this plugin. Organizations running affected versions should prioritize patching or applying mitigations immediately to prevent potential compromise. Countries with large WordPress user bases and significant e-commerce or content management deployments are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:09:46 UTC

Technical Analysis

CVE-2024-6365 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code, or Code Injection) found in the Product Table by WBW WordPress plugin. The vulnerability resides in the 'saveCustomTitle' function within the languages/customTitle.php file, where the plugin fails to perform proper authorization checks and input sanitization on data appended during the save operation. This allows unauthenticated attackers to inject and execute arbitrary code on the server hosting the WordPress site. The vulnerability affects all versions up to and including 2.0.1, making it widespread among users of this plugin. The CVSS 3.1 base score of 9.8 reflects the vulnerability’s critical nature, with an attack vector of network (remote), no privileges required, no user interaction needed, and full impact on confidentiality, integrity, and availability. The lack of authentication and sanitization means an attacker can remotely execute code, potentially leading to full server compromise, data theft, defacement, or use of the server as a pivot point for further attacks. Although no public exploits have been reported yet, the vulnerability’s characteristics make it highly exploitable. The plugin is commonly used to create sortable, filterable product tables in WordPress, often in e-commerce or catalog sites, increasing the attractiveness of targets. The vulnerability was published on July 9, 2024, with no official patch available at the time of reporting, emphasizing the urgency for mitigation.

Potential Impact

The impact of CVE-2024-6365 is severe for organizations worldwide using the Product Table by WBW plugin. Successful exploitation allows unauthenticated remote attackers to execute arbitrary code on the web server, potentially leading to full system compromise. This can result in data breaches, unauthorized data modification, website defacement, deployment of malware or ransomware, and use of the compromised server as a launchpad for attacks on internal networks. The confidentiality, integrity, and availability of affected systems are all at high risk. Organizations relying on WordPress for e-commerce, content management, or customer-facing portals are particularly vulnerable, as attackers could disrupt business operations or steal sensitive customer data. The vulnerability’s ease of exploitation and lack of required authentication make it a prime target for automated attacks and wormable exploits, increasing the risk of widespread compromise if not addressed promptly.

Mitigation Recommendations

1. Immediately update the Product Table by WBW plugin to a patched version once available. Monitor the vendor’s announcements for official patches. 2. If no patch is available, temporarily disable or uninstall the plugin to eliminate the attack surface. 3. Restrict access to the vulnerable 'saveCustomTitle' function or related endpoints using web application firewalls (WAFs) or server-level access controls to block unauthorized requests. 4. Implement strict input validation and sanitization on any user-supplied data related to the plugin, if custom modifications are possible. 5. Monitor web server and application logs for suspicious activity, such as unexpected POST requests to the vulnerable function or unusual code execution patterns. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 7. Harden WordPress installations by following best practices, including least privilege for file permissions and disabling unnecessary plugins. 8. Conduct regular backups of affected systems to enable recovery in case of compromise. 9. Educate site administrators about the risk and signs of exploitation to enable rapid response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-06-27T00:29:53.776Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c02b7ef31ef0b55eea8

Added to database: 2/25/2026, 9:39:14 PM

Last enriched: 2/26/2026, 3:09:46 AM

Last updated: 2/26/2026, 9:40:15 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats