CVE-2024-9756: CWE-862 Missing Authorization in sldesignpl Order Attachments for WooCommerce
CVE-2024-9756 is a medium severity vulnerability in the Order Attachments for WooCommerce WordPress plugin (versions 2. 0 to 2. 4. 1). It arises from a missing authorization check on the wcoa_add_attachment AJAX action, allowing authenticated users with subscriber-level access or higher to upload limited file types without proper permission. Although the vulnerability does not allow unauthenticated access and has no direct impact on confidentiality or availability, it can lead to integrity issues through unauthorized file uploads. No known exploits are currently reported in the wild. Organizations using this plugin should apply patches or implement strict access controls to mitigate risk. Countries with significant WooCommerce usage and WordPress e-commerce deployments are most at risk, including the United States, United Kingdom, Germany, Canada, Australia, and others. The vulnerability’s CVSS score is 4.
AI Analysis
Technical Summary
CVE-2024-9756 is a vulnerability identified in the Order Attachments for WooCommerce plugin for WordPress, specifically affecting versions 2.0 through 2.4.1. The root cause is a missing authorization check (CWE-862) on the AJAX action wcoa_add_attachment, which handles file uploads attached to WooCommerce orders. This flaw allows any authenticated user with subscriber-level privileges or higher to upload files of limited types to the server without proper capability verification. Since subscriber-level users are typically low-privileged, this expands the attack surface beyond administrators or shop managers. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The CVSS 3.1 vector indicates low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), and impacts integrity only (I:L) without affecting confidentiality or availability. Although the plugin restricts file types, unauthorized uploads could be leveraged for further attacks such as web shell deployment or malicious content hosting if combined with other vulnerabilities or misconfigurations. No public exploits or active exploitation have been reported as of the publication date. The vulnerability was reserved and published in early October 2024, with no official patches linked yet, indicating a need for prompt vendor response or interim mitigations.
Potential Impact
The primary impact of CVE-2024-9756 is on data integrity, as unauthorized file uploads can allow attackers to place malicious files on the server. While the plugin limits file types, attackers might still upload files that could be used for phishing, defacement, or as a foothold for further compromise if other vulnerabilities exist. This could lead to reputational damage, potential data manipulation, or indirect compromise of the e-commerce platform. Since the vulnerability requires authenticated access at subscriber level or above, the risk is somewhat mitigated by the need for user credentials, but subscriber accounts are often easier to obtain or create. The vulnerability does not directly affect confidentiality or availability, and no denial of service or data leakage is indicated. However, the presence of unauthorized files could complicate incident response and recovery. Organizations relying on WooCommerce with this plugin installed may face increased risk of targeted attacks, especially if they have weak user account controls or lack monitoring for unusual file uploads.
Mitigation Recommendations
To mitigate CVE-2024-9756, organizations should first check for and apply any official patches or updates released by the plugin vendor once available. Until patches are released, administrators should restrict user roles to the minimum necessary, avoiding granting subscriber or higher privileges to untrusted users. Implement strict file upload monitoring and scanning to detect unauthorized or suspicious files uploaded via the plugin. Consider disabling or restricting the Order Attachments feature if not essential. Employ web application firewalls (WAFs) with custom rules to block unauthorized AJAX requests targeting wcoa_add_attachment. Regularly audit user accounts and permissions to prevent privilege escalation or unauthorized access. Additionally, harden the WordPress environment by disabling execution of uploaded files in upload directories and enforcing strong authentication mechanisms such as MFA. Monitoring logs for unusual activity related to file uploads can help detect exploitation attempts early.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, India, Brazil, Italy
CVE-2024-9756: CWE-862 Missing Authorization in sldesignpl Order Attachments for WooCommerce
Description
CVE-2024-9756 is a medium severity vulnerability in the Order Attachments for WooCommerce WordPress plugin (versions 2. 0 to 2. 4. 1). It arises from a missing authorization check on the wcoa_add_attachment AJAX action, allowing authenticated users with subscriber-level access or higher to upload limited file types without proper permission. Although the vulnerability does not allow unauthenticated access and has no direct impact on confidentiality or availability, it can lead to integrity issues through unauthorized file uploads. No known exploits are currently reported in the wild. Organizations using this plugin should apply patches or implement strict access controls to mitigate risk. Countries with significant WooCommerce usage and WordPress e-commerce deployments are most at risk, including the United States, United Kingdom, Germany, Canada, Australia, and others. The vulnerability’s CVSS score is 4.
AI-Powered Analysis
Technical Analysis
CVE-2024-9756 is a vulnerability identified in the Order Attachments for WooCommerce plugin for WordPress, specifically affecting versions 2.0 through 2.4.1. The root cause is a missing authorization check (CWE-862) on the AJAX action wcoa_add_attachment, which handles file uploads attached to WooCommerce orders. This flaw allows any authenticated user with subscriber-level privileges or higher to upload files of limited types to the server without proper capability verification. Since subscriber-level users are typically low-privileged, this expands the attack surface beyond administrators or shop managers. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The CVSS 3.1 vector indicates low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), and impacts integrity only (I:L) without affecting confidentiality or availability. Although the plugin restricts file types, unauthorized uploads could be leveraged for further attacks such as web shell deployment or malicious content hosting if combined with other vulnerabilities or misconfigurations. No public exploits or active exploitation have been reported as of the publication date. The vulnerability was reserved and published in early October 2024, with no official patches linked yet, indicating a need for prompt vendor response or interim mitigations.
Potential Impact
The primary impact of CVE-2024-9756 is on data integrity, as unauthorized file uploads can allow attackers to place malicious files on the server. While the plugin limits file types, attackers might still upload files that could be used for phishing, defacement, or as a foothold for further compromise if other vulnerabilities exist. This could lead to reputational damage, potential data manipulation, or indirect compromise of the e-commerce platform. Since the vulnerability requires authenticated access at subscriber level or above, the risk is somewhat mitigated by the need for user credentials, but subscriber accounts are often easier to obtain or create. The vulnerability does not directly affect confidentiality or availability, and no denial of service or data leakage is indicated. However, the presence of unauthorized files could complicate incident response and recovery. Organizations relying on WooCommerce with this plugin installed may face increased risk of targeted attacks, especially if they have weak user account controls or lack monitoring for unusual file uploads.
Mitigation Recommendations
To mitigate CVE-2024-9756, organizations should first check for and apply any official patches or updates released by the plugin vendor once available. Until patches are released, administrators should restrict user roles to the minimum necessary, avoiding granting subscriber or higher privileges to untrusted users. Implement strict file upload monitoring and scanning to detect unauthorized or suspicious files uploaded via the plugin. Consider disabling or restricting the Order Attachments feature if not essential. Employ web application firewalls (WAFs) with custom rules to block unauthorized AJAX requests targeting wcoa_add_attachment. Regularly audit user accounts and permissions to prevent privilege escalation or unauthorized access. Additionally, harden the WordPress environment by disabling execution of uploaded files in upload directories and enforcing strong authentication mechanisms such as MFA. Monitoring logs for unusual activity related to file uploads can help detect exploitation attempts early.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-10-09T19:43:57.143Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b5eb7ef31ef0b554b67
Added to database: 2/25/2026, 9:36:30 PM
Last enriched: 2/25/2026, 11:40:13 PM
Last updated: 2/26/2026, 8:15:09 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.