Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8030: CWE-502 Deserialization of Untrusted Data in bdthemes Ultimate Store Kit Elementor Addons, Woocommerce Builder, EDD Builder, Elementor Store Builder, Product Grid, Product Table, Woocommerce Slider

0
Critical
VulnerabilityCVE-2024-8030cvecve-2024-8030cwe-502
Published: Wed Aug 28 2024 (08/28/2024, 02:05:47 UTC)
Source: CVE Database V5
Vendor/Project: bdthemes
Product: Ultimate Store Kit Elementor Addons, Woocommerce Builder, EDD Builder, Elementor Store Builder, Product Grid, Product Table, Woocommerce Slider

Description

CVE-2024-8030 is a critical PHP Object Injection vulnerability in the bdthemes Ultimate Store Kit Elementor Addons and related plugins up to version 2. 0. 3. It arises from unsafe deserialization of untrusted data via the _ultimate_store_kit_wishlist cookie, allowing unauthenticated attackers to inject PHP objects. While the vulnerable plugin itself lacks a POP (Property Oriented Programming) chain, the presence of additional plugins or themes with exploitable POP chains can enable attackers to execute arbitrary code, delete files, or access sensitive data. The vulnerability has a CVSS score of 9. 8, indicating high severity with network attack vector, no required privileges, and no user interaction. No known exploits are currently reported in the wild. Organizations using these plugins in their WordPress e-commerce environments are at significant risk, especially if combined with other vulnerable components. Immediate patching or mitigation is critical to prevent potential full system compromise.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:50:48 UTC

Technical Analysis

CVE-2024-8030 is a critical vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting multiple bdthemes WordPress plugins including Ultimate Store Kit Elementor Addons, Woocommerce Builder, EDD Builder, Elementor Store Builder, Product Grid, Product Table, and Woocommerce Slider. The flaw exists due to unsafe deserialization of PHP objects from the _ultimate_store_kit_wishlist cookie, which is user-controllable input. This allows an unauthenticated attacker to inject arbitrary PHP objects into the application. Although the vulnerable plugin itself does not contain a Property Oriented Programming (POP) chain necessary for direct exploitation, if other plugins or themes installed on the same WordPress instance provide such chains, attackers can leverage this vulnerability to perform destructive actions such as arbitrary file deletion, sensitive data disclosure, or remote code execution. The vulnerability is exploitable remotely over the network without any authentication or user interaction, making it highly dangerous. The CVSS v3.1 base score of 9.8 reflects the critical impact on confidentiality, integrity, and availability. No official patches are currently linked, and no exploits have been observed in the wild, but the risk remains high due to the widespread use of these plugins in e-commerce WordPress sites.

Potential Impact

The impact of CVE-2024-8030 is severe for organizations using the affected bdthemes plugins in their WordPress e-commerce environments. Successful exploitation can lead to complete compromise of the web server hosting the vulnerable plugins, including arbitrary code execution, deletion of critical files, and exposure of sensitive customer and business data. This can result in operational disruption, data breaches, financial loss, reputational damage, and potential regulatory penalties. Since the vulnerability requires no authentication and no user interaction, attackers can scan and exploit vulnerable sites en masse. The risk is amplified in environments where additional vulnerable plugins or themes provide POP chains, enabling full exploitation. E-commerce platforms relying on these plugins for product display, shopping cart functionality, and user wishlists are particularly at risk, potentially affecting online sales and customer trust.

Mitigation Recommendations

1. Immediate action should be to update the affected bdthemes plugins to a patched version once available from the vendor. Monitor official bdthemes channels for security updates. 2. In the absence of patches, implement Web Application Firewall (WAF) rules to block or sanitize requests containing the _ultimate_store_kit_wishlist cookie or suspicious serialized PHP objects. 3. Audit and minimize the number of installed plugins and themes, especially those known to contain POP chains, to reduce the attack surface. 4. Employ strict input validation and disable PHP object deserialization where possible, or use safer serialization formats like JSON. 5. Regularly back up website data and configurations to enable recovery in case of compromise. 6. Monitor logs for unusual activity related to cookie manipulation or deserialization errors. 7. Restrict file system permissions to limit the impact of potential file deletion or modification. 8. Conduct penetration testing focusing on deserialization vulnerabilities and chained exploits in the WordPress environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-08-20T20:01:14.174Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c22b7ef31ef0b560492

Added to database: 2/25/2026, 9:39:46 PM

Last enriched: 2/26/2026, 3:50:48 AM

Last updated: 2/26/2026, 8:07:04 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats