Categories
Security Uncategorized wordpress

Security Advisory: WooCommerce Delivery Notes RCE Exploit (CVE-2025-13773)

Summary

A critical Remote Code Execution vulnerability in WooCommerce Delivery Notes <= 5.8.0 allowed attackers to inject PHP code into plugin settings. The malicious code executed when any admin or the backend printed an invoice via DomPDF, installing backdoors and creating unauthorized admin accounts.

This vulnerability was publicly disclosed in December 2025 and is actively being exploited in the wild.

Attack Chain

  1. Attacker injected obfuscated PHP into wcdn_invoice_customization option via unsanitized settings endpoint
  2. Admin triggered execution by printing any invoice (DomPDF rendered malicious payload with isPhpEnabled = true)
  3. Backdoor wpclean.php created, followed by wp-sph and wp-downloader plugins
  4. Unauthorized admin user created for persistent access

Affected Versions

  • Vulnerable: WooCommerce Delivery Notes <= 5.8.0
  • Patched: Version 5.9.0 (changelog)

Remediation

Immediate Actions

-- Remove malicious settings
DELETE FROM wp_options WHERE option_name = 'wcdn_invoice_customization';

-- Find obfuscated payloads (chr() encoding commonly used)
SELECT option_name FROM wp_options WHERE option_value LIKE '%chr(%';
  1. Update plugin to >= 5.9.0 immediately
  2. Delete backdoor files: wpclean.php, wp-sph/, wp-downloader/
  3. Audit wp_users for unauthorized administrators
  4. Change all user passwords

Indicators of Compromise

  • PHP files in uploads or wp-content/plugins directory
  • Unknown admin users (e.g., woobot)
  • wp_options entries containing chr( sequences
  • Access logs showing requests to wpclean (with status code 200) and/or wp-sph

References


Severity: Critical (CVSS 9.8) | Status: Actively Exploited | Fix: Update to v5.9.0+

Leave a Reply

Your email address will not be published. Required fields are marked *

css.php