The Custom Product Tabs for WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.8.5 via deserialization of untrusted input in the 'yikes_woo_products_tabs' post meta parameter. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
Metrics
Affected Vendors & Products
References
History
Tue, 25 Feb 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Yikesinc
Yikesinc custom Product Tabs For Woocommerce |
|
CPEs | cpe:2.3:a:yikesinc:custom_product_tabs_for_woocommerce:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Yikesinc
Yikesinc custom Product Tabs For Woocommerce |
Tue, 07 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 07 Jan 2025 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Custom Product Tabs for WooCommerce plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.8.5 via deserialization of untrusted input in the 'yikes_woo_products_tabs' post meta parameter. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | |
Title | Custom Product Tabs for WooCommerce <= 1.8.5 - Authenticated (Shop Manager+) PHP Object Injection | |
Weaknesses | CWE-502 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-01-07T16:25:33.618Z
Reserved: 2024-11-19T20:58:53.291Z
Link: CVE-2024-11465

Updated: 2025-01-07T15:54:43.824Z

Status : Analyzed
Published: 2025-01-07T05:15:13.287
Modified: 2025-02-25T22:53:14.263
Link: CVE-2024-11465

No data.