Data Modification Vulnerability in WooCommerce EAN Payment Gateway Plugin
CVE-2023-4947

4.3MEDIUM

Key Information:

Vendor
WordPress
Vendor
CVE Published:
20 October 2023

Summary

The WooCommerce EAN Payment Gateway plugin for WordPress suffers from a critical issue that allows authenticated attackers with contributor-level access or higher to exploit a missing capability check on the 'refresh_order_ean_data' AJAX action. This vulnerability enables them to modify EAN numbers for orders without proper authorization, potentially leading to fraudulent activity and data integrity issues.

Affected Version(s)

WooCommerce EAN Payment Gateway * < 6.1.0

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Lana Codes
Yan&Co ApS
.