Data Modification Vulnerability in WooCommerce EAN Payment Gateway Plugin
CVE-2023-4947
4.3MEDIUM
Key Information:
- Vendor
- WordPress
- Vendor
- CVE Published:
- 20 October 2023
Summary
The WooCommerce EAN Payment Gateway plugin for WordPress suffers from a critical issue that allows authenticated attackers with contributor-level access or higher to exploit a missing capability check on the 'refresh_order_ean_data' AJAX action. This vulnerability enables them to modify EAN numbers for orders without proper authorization, potentially leading to fraudulent activity and data integrity issues.
Affected Version(s)
WooCommerce EAN Payment Gateway * < 6.1.0
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Lana Codes
Yan&Co ApS