CVE Alert: CVE-2024-13342 – pluggabl – Booster for WooCommerce – PDF Invoices, Abandoned Cart, Variation Swatches & 100+ Tools

CVE-2024-13342

HIGHNo exploitation known

The Booster for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ‘add_files_to_order’ function in all versions up to, and including, 7.2.4. This makes it possible for unauthenticated attackers to upload arbitrary files with double extensions on the affected site’s server which may make remote code execution possible. This is only exploitable on select instances where the configuration will execute the first extension present.

CVSS v3.1 (8.1)
Vendor
pluggabl
Product
Booster for WooCommerce – PDF Invoices, Abandoned Cart, Variation Swatches & 100+ Tools
Versions
* lte 7.2.4
CWE
CWE-434, CWE-434 Unrestricted Upload of File with Dangerous Type
Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Published
2025-08-29T10:54:01.765Z
Updated
2025-08-29T11:47:19.969Z

AI Summary Analysis

Risk verdict

High risk if unpatched; no active exploitation signals are evident, but remote, unauthenticated file upload could enable full server compromise under certain configurations.

Why this matters

Unauthenticated attackers can upload arbitrary files via the vulnerable upload path, with potential remote code execution if the server executes the uploaded payload. For ecommerce sites, this threatens data integrity, customer data, and uptime, with possible defacement or persistence across the site.

Most likely attack path

An attacker targets exposed instances of the vulnerable plugin over the internet (AV: remote). The exploit relies on high complexity and server configuration that executes the first extension; if the payload is accepted and executed, an attacker could place a web shell or similar code, enabling further access or data exfiltration. No user interaction or privileges are required, but success is contingent on server-side file execution policies and upload handling.

Who is most exposed

WordPress sites using the Booster for WooCommerce plugin, especially on shared hosting or servers with permissive upload directories and misconfigured PHP execution in uploads.

Detection ideas

  • Files with double extensions uploaded to order-related endpoints (e.g., something.php.jpg) or unexpected PHP files in uploads.
  • PHP payloads or web shells appearing in the uploads directory or web-accessible paths.
  • Unusual spikes in anonymous file uploads or POST requests to the upload function without authentication.
  • Content-type and extension mismatches; script execution attempts reflected in server logs.
  • New, executable scripts executed from the uploads area or sudden 500/502 errors after uploads.

Mitigation and prioritisation

  • Patch to the vendor’s fixed version or latest available release; verify upgrade on staging before production.
  • If patching quickly isn’t possible, disable the vulnerable upload functionality or the plugin feature involved in order uploads.
  • Enforce strict upload controls: deny double extensions, restrict to safe file types, and disable PHP execution in uploads directories.
  • Relocate uploads to non-executable paths; implement WAF rules to block suspicious file patterns.
  • Change-management: back up, test in staging, and roll out with monitoring; establish a rollback plan.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.