Cyber Posture

CVE-2024-13921

HighRCE

Published: 20 March 2025

Published
20 March 2025
Modified
26 March 2025
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0031 54.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-13921 is a high-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Webtoffee Order Export \& Order Import For Woocommerce. Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 45.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Remediating the specific flaw in the Order Export & Order Import for WooCommerce plugin via patching directly eliminates the PHP object injection vulnerability from unsafe deserialization of the 'form_data' parameter.

prevent

Validating untrusted inputs like the 'form_data' parameter prior to deserialization directly prevents authenticated attackers from injecting malicious PHP objects.

prevent

Restricting and verifying user-installed third-party software such as vulnerable WordPress plugins mitigates the risk of deploying components susceptible to PHP object injection.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes a deserialization vulnerability in a public-facing WordPress plugin exploitable by authenticated admins to inject PHP objects, directly enabling exploitation of the application (T1190). Full impact depends on external POP chains for code execution or file ops, making other mappings (e.g., T1059, T1070) indirect.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

NVD Description

The Order Export & Order Import for WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.6.0 via deserialization of untrusted input from the 'form_data' parameter. This makes it possible for authenticated…

more

attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.

Deeper analysisAI

CVE-2024-13921 is a PHP Object Injection vulnerability (CWE-502) affecting the Order Export & Order Import for WooCommerce plugin for WordPress in all versions up to and including 2.6.0. The issue arises from deserialization of untrusted input via the 'form_data' parameter, enabling authenticated attackers with Administrator-level access or higher to inject a PHP Object. The vulnerability carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and was published on 2025-03-20.

Exploitation requires an authenticated attacker with at least Administrator privileges. While the vulnerability allows PHP Object injection, no known Proof-of-POP (Property-Oriented Programming) chain exists within the vulnerable plugin itself, rendering it ineffective in isolation. Impact only materializes if another plugin or theme on the target site provides a POP chain, potentially enabling actions such as arbitrary file deletion, sensitive data retrieval, or code execution, depending on the chain available.

Advisories and references, including Wordfence threat intelligence and WordPress plugin trac repositories, point to the vulnerable code in the export and import AJAX classes (class-export-ajax.php and class-import-ajax.php). A patch is indicated via changeset 3258567 in the plugin's trac, suggesting mitigation through updating to a version beyond 2.6.0.

Details

CWE(s)

Affected Products

webtoffee
order export \& order import for woocommerce
≤ 2.6.1

CVEs Like This One

CVE-2024-13923Same product: Webtoffee Order Export \& Order Import For Woocommerce
CVE-2025-1913Same product class: WordPress / CMS plugin
CVE-2025-1971Same vendor: Webtoffee
CVE-2025-2485Same product class: WordPress / CMS plugin
CVE-2025-1912Same product class: WordPress / CMS plugin
CVE-2025-1441Same product class: WordPress / CMS plugin
CVE-2025-1970Same vendor: Webtoffee
CVE-2024-13904Same product class: WordPress / CMS plugin
CVE-2025-24618Same product class: WordPress / CMS plugin
CVE-2024-13558Same product class: WordPress / CMS plugin

References