Unauthorized Data Modification in Stripe Payment Plugin for WooCommerce
CVE-2023-4040

5.3MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
18 August 2023

Summary

The Stripe Payment Plugin for WooCommerce contains a flaw that allows unauthorized modifications of data. Due to a missing capability check in the eh_callback_handler function, versions up to and including 3.7.9 are susceptible to attacks. This vulnerability enables unauthenticated attackers to alter the order status of any WooCommerce order, posing significant risks to online store operations and customer trust. It is crucial for users of affected versions to apply updates to safeguard their systems.

Affected Version(s)

Stripe Payment Plugin for WooCommerce 3.7.9

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Francesco Carlucci
.