Lucene search

K
cveWordfenceCVE-2024-1119
HistoryMar 20, 2024 - 7:15 a.m.

CVE-2024-1119

2024-03-2007:15:08
Wordfence
web.nvd.nist.gov
41
order tip
woocommerce
wordpress
plugin
vulnerability
unauthorized access
data
nvd
cve-2024-1119

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

6.1

Confidence

High

EPSS

0

Percentile

15.5%

The Order Tip for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the export_tips_to_csv() function in all versions up to, and including, 1.3.1. This makes it possible for unauthenticated attackers to export the plugin’s order fees.

Affected configurations

Vulners
Vulnrichment
Node
railmediaorder_tip_for_woocommerceRange1.3.1wordpress
VendorProductVersionCPE
railmediaorder_tip_for_woocommerce*cpe:2.3:a:railmedia:order_tip_for_woocommerce:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "railmedia",
    "product": "Order Tip for WooCommerce",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.3.1",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

6.1

Confidence

High

EPSS

0

Percentile

15.5%