CVE-2024-11034
Request a Quote for WooCommerce and Elementor – Get a Quote Button – Product Enquiry Form Popup – Product Quotation <= 1.4 - Unauthenticated Arbitrary Shortcode Execution via fire_contact_form
CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th
The The Request a Quote for WooCommerce and Elementor – Get a Quote Button – Product Enquiry Form Popup – Product Quotation plugin for WordPress is vulnerable to arbitrary shortcode execution via fire_contact_form AJAX action in all versions up to, and including, 1.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
| CWE | CWE-94 |
| Vendor | wpbean |
| Product | request a quote for woocommerce – get a quote button |
| Published | Nov 23, 2024 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for wpbean request a quote for woocommerce – get a quote button
Be the first to know when new high vulnerabilities affecting wpbean request a quote for woocommerce – get a quote button are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
wpbean / Request a Quote for WooCommerce – Get a Quote Button
0 ≤ 1.4
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/3ccd3504-5663-48cd-90bc-502c2ce232f7?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/get-a-quote-button-for-woocommerce/tags/1.3.9/includes/class-ajax.php#L31 wordpress.org: https://wordpress.org/plugins/get-a-quote-button-for-woocommerce/#developers plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3195227/
Credits
Arkadiusz Hydzik