Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Critical WooCommerce Vulnerability Targeted Hours After Patch

Hackers have started targeting a critical WooCommerce vulnerability only days after patches started rolling out, patchstack says.

WooCommerce is a popular open-source eCommerce plugin for WordPress, with more than 5 million installations to date, making it an attractive target for cybercriminals.

Hackers have started targeting a critical WooCommerce vulnerability only days after patches started rolling out, patchstack says.

WooCommerce is a popular open-source eCommerce plugin for WordPress, with more than 5 million installations to date, making it an attractive target for cybercriminals.

On Thursday, WooCommerce said that on July 13 it received a report of a critical vulnerability in the plugin, urging users to update their installations as soon as possible, but without providing additional information on the bug itself.

“Upon learning about the issue, our team immediately conducted a thorough investigation, audited all related codebases, and created a patch fix for every impacted version (90+ releases) which was deployed automatically to vulnerable stores,” the WooCommerce team said.

The team revealed that WooCommerce versions 3.3 to 5.5 and the WooCommerce Blocks feature plugin versions 2.5 to 5.5 were found to be impacted, explaining that version 5.5.1, “or the highest number possible in your release branch,” address the issue.

According to patchstack, the vulnerability is an SQL injection bug that is already being targeted in a limited set of attacks. The targeting started on the evening of July 15.

“These attacks seem to be very limited so far, but seem to be using UNION and SLEEP based SQL injections,” patchstack said. The website protection firm also published a set of indicators of compromise.

Site admins are advised to update their WooCommerce installations as soon as possible to ensure that both their websites and their users remain protected.

Advertisement. Scroll to continue reading.

“The discovery of a new SQL injection (SQLi) vulnerability in WooCommerce is a good reminder to check on the security and to update programs used with WordPress (in addition to checking on and updating WordPress itself). SQLi vulnerabilities are part of the OWASP Top 10 Web Application Risks, and well known, so it’s a surprise these vulnerabilities aren’t discovered during application development,” Pravin Madhani, CEO and Co-Founder, K2 Cyber Security, told SecurityWeek in an emailed comment.

Related: Vulnerability That Allows Complete WordPress Site Takeover Exploited

Related: Hackers Exploiting Recent Vulnerabilities in Thrive Theme WordPress Plugins

Related: WordPress Malware Targets WooCommerce Stores

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Kenna Security co-founder Ed Bellis has joined Empirical Security as Chief Executive Officer.

Robert Shaker II has joined application security firm ActiveState as Chief Product and Technology Officer.

MorganFranklin Cyber has promoted Nick Stallone and Ferdinand Hamada into newly created roles.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.