CVE-2024-11465
Published: 07 January 2025
Summary
CVE-2024-11465 is a high-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Yikesinc Custom Product Tabs For Woocommerce. Its CVSS base score is 7.2 (High).
Operationally, ranked in the top 23.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely remediation of the known deserialization flaw in Custom Product Tabs for WooCommerce versions up to 1.8.5, preventing exploitation via patching.
Mandates validation and filtering of untrusted input to the 'yikes_woo_products_tabs' post meta parameter, directly countering the PHP Object Injection vulnerability.
Enforces least privilege to restrict Shop Manager-level access or higher from modifying sensitive post meta, reducing the authenticated attack surface.
NVD Description
The Custom Product Tabs for WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.8.5 via deserialization of untrusted input in the 'yikes_woo_products_tabs' post meta parameter. This makes it possible for authenticated…
more
attackers, with Shop Manager-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
Deeper analysisAI
CVE-2024-11465 is a PHP Object Injection vulnerability (CWE-502) affecting the Custom Product Tabs for WooCommerce plugin for WordPress in all versions up to and including 1.8.5. The issue arises from deserialization of untrusted input in the 'yikes_woo_products_tabs' post meta parameter, enabling authenticated attackers to inject a PHP Object. It has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
Authenticated attackers with Shop Manager-level access or higher can exploit this vulnerability over the network with low complexity. While no known Proof-of-Concept (POP) chain exists within the vulnerable plugin itself, the presence of a POP chain via an additional plugin or theme on the target system could allow the attacker to achieve arbitrary file deletion, retrieval of sensitive data, or remote code execution.
References provided by the CVE point to specific code locations in the plugin's source, including lines in class.yikes-woo-generate-html.php (L19), class.yikes-woo-saved-tabs.php (L222, L449), class.yikes-woo-tabs-display.php (L47), and the main plugin file (L262), highlighting the deserialization points in the admin and public components. No patch or mitigation details are specified in the available information.
Details
- CWE(s)