CVE-2024-6365: CWE-94 Improper Control of Generation of Code ('Code Injection') in woobewoo Product Table by WBW
CVE-2024-6365 is a critical remote code execution vulnerability in the WordPress plugin Product Table by WBW, affecting all versions up to 2. 0. 1. The flaw exists in the 'saveCustomTitle' function due to missing authorization and lack of input sanitization in languages/customTitle. php, allowing unauthenticated attackers to execute arbitrary code on the server. This vulnerability has a CVSS score of 9. 8, indicating a high impact on confidentiality, integrity, and availability without requiring authentication or user interaction. Although no known exploits are currently reported in the wild, the ease of exploitation and severity make it a significant threat to WordPress sites using this plugin. Organizations running affected versions should prioritize patching or applying mitigations immediately to prevent potential compromise. Countries with large WordPress user bases and significant e-commerce or content management deployments are at higher risk.
AI Analysis
Technical Summary
CVE-2024-6365 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code, or Code Injection) found in the Product Table by WBW WordPress plugin. The vulnerability resides in the 'saveCustomTitle' function within the languages/customTitle.php file, where the plugin fails to perform proper authorization checks and input sanitization on data appended during the save operation. This allows unauthenticated attackers to inject and execute arbitrary code on the server hosting the WordPress site. The vulnerability affects all versions up to and including 2.0.1, making it widespread among users of this plugin. The CVSS 3.1 base score of 9.8 reflects the vulnerability’s critical nature, with an attack vector of network (remote), no privileges required, no user interaction needed, and full impact on confidentiality, integrity, and availability. The lack of authentication and sanitization means an attacker can remotely execute code, potentially leading to full server compromise, data theft, defacement, or use of the server as a pivot point for further attacks. Although no public exploits have been reported yet, the vulnerability’s characteristics make it highly exploitable. The plugin is commonly used to create sortable, filterable product tables in WordPress, often in e-commerce or catalog sites, increasing the attractiveness of targets. The vulnerability was published on July 9, 2024, with no official patch available at the time of reporting, emphasizing the urgency for mitigation.
Potential Impact
The impact of CVE-2024-6365 is severe for organizations worldwide using the Product Table by WBW plugin. Successful exploitation allows unauthenticated remote attackers to execute arbitrary code on the web server, potentially leading to full system compromise. This can result in data breaches, unauthorized data modification, website defacement, deployment of malware or ransomware, and use of the compromised server as a launchpad for attacks on internal networks. The confidentiality, integrity, and availability of affected systems are all at high risk. Organizations relying on WordPress for e-commerce, content management, or customer-facing portals are particularly vulnerable, as attackers could disrupt business operations or steal sensitive customer data. The vulnerability’s ease of exploitation and lack of required authentication make it a prime target for automated attacks and wormable exploits, increasing the risk of widespread compromise if not addressed promptly.
Mitigation Recommendations
1. Immediately update the Product Table by WBW plugin to a patched version once available. Monitor the vendor’s announcements for official patches. 2. If no patch is available, temporarily disable or uninstall the plugin to eliminate the attack surface. 3. Restrict access to the vulnerable 'saveCustomTitle' function or related endpoints using web application firewalls (WAFs) or server-level access controls to block unauthorized requests. 4. Implement strict input validation and sanitization on any user-supplied data related to the plugin, if custom modifications are possible. 5. Monitor web server and application logs for suspicious activity, such as unexpected POST requests to the vulnerable function or unusual code execution patterns. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 7. Harden WordPress installations by following best practices, including least privilege for file permissions and disabling unnecessary plugins. 8. Conduct regular backups of affected systems to enable recovery in case of compromise. 9. Educate site administrators about the risk and signs of exploitation to enable rapid response.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan, South Korea
CVE-2024-6365: CWE-94 Improper Control of Generation of Code ('Code Injection') in woobewoo Product Table by WBW
Description
CVE-2024-6365 is a critical remote code execution vulnerability in the WordPress plugin Product Table by WBW, affecting all versions up to 2. 0. 1. The flaw exists in the 'saveCustomTitle' function due to missing authorization and lack of input sanitization in languages/customTitle. php, allowing unauthenticated attackers to execute arbitrary code on the server. This vulnerability has a CVSS score of 9. 8, indicating a high impact on confidentiality, integrity, and availability without requiring authentication or user interaction. Although no known exploits are currently reported in the wild, the ease of exploitation and severity make it a significant threat to WordPress sites using this plugin. Organizations running affected versions should prioritize patching or applying mitigations immediately to prevent potential compromise. Countries with large WordPress user bases and significant e-commerce or content management deployments are at higher risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-6365 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code, or Code Injection) found in the Product Table by WBW WordPress plugin. The vulnerability resides in the 'saveCustomTitle' function within the languages/customTitle.php file, where the plugin fails to perform proper authorization checks and input sanitization on data appended during the save operation. This allows unauthenticated attackers to inject and execute arbitrary code on the server hosting the WordPress site. The vulnerability affects all versions up to and including 2.0.1, making it widespread among users of this plugin. The CVSS 3.1 base score of 9.8 reflects the vulnerability’s critical nature, with an attack vector of network (remote), no privileges required, no user interaction needed, and full impact on confidentiality, integrity, and availability. The lack of authentication and sanitization means an attacker can remotely execute code, potentially leading to full server compromise, data theft, defacement, or use of the server as a pivot point for further attacks. Although no public exploits have been reported yet, the vulnerability’s characteristics make it highly exploitable. The plugin is commonly used to create sortable, filterable product tables in WordPress, often in e-commerce or catalog sites, increasing the attractiveness of targets. The vulnerability was published on July 9, 2024, with no official patch available at the time of reporting, emphasizing the urgency for mitigation.
Potential Impact
The impact of CVE-2024-6365 is severe for organizations worldwide using the Product Table by WBW plugin. Successful exploitation allows unauthenticated remote attackers to execute arbitrary code on the web server, potentially leading to full system compromise. This can result in data breaches, unauthorized data modification, website defacement, deployment of malware or ransomware, and use of the compromised server as a launchpad for attacks on internal networks. The confidentiality, integrity, and availability of affected systems are all at high risk. Organizations relying on WordPress for e-commerce, content management, or customer-facing portals are particularly vulnerable, as attackers could disrupt business operations or steal sensitive customer data. The vulnerability’s ease of exploitation and lack of required authentication make it a prime target for automated attacks and wormable exploits, increasing the risk of widespread compromise if not addressed promptly.
Mitigation Recommendations
1. Immediately update the Product Table by WBW plugin to a patched version once available. Monitor the vendor’s announcements for official patches. 2. If no patch is available, temporarily disable or uninstall the plugin to eliminate the attack surface. 3. Restrict access to the vulnerable 'saveCustomTitle' function or related endpoints using web application firewalls (WAFs) or server-level access controls to block unauthorized requests. 4. Implement strict input validation and sanitization on any user-supplied data related to the plugin, if custom modifications are possible. 5. Monitor web server and application logs for suspicious activity, such as unexpected POST requests to the vulnerable function or unusual code execution patterns. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 7. Harden WordPress installations by following best practices, including least privilege for file permissions and disabling unnecessary plugins. 8. Conduct regular backups of affected systems to enable recovery in case of compromise. 9. Educate site administrators about the risk and signs of exploitation to enable rapid response.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-06-27T00:29:53.776Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c02b7ef31ef0b55eea8
Added to database: 2/25/2026, 9:39:14 PM
Last enriched: 2/26/2026, 3:09:46 AM
Last updated: 2/26/2026, 9:40:15 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.