Lucene search

K
cvelistWordfenceCVELIST:CVE-2024-4185
HistoryApr 30, 2024 - 8:32 a.m.

CVE-2024-4185

2024-04-3008:32:23
Wordfence
www.cve.org
customer email verification
woocommerce plugin
wordpress
vulnerable
email verification
authentication bypass
insufficiently random activation code
unauthenticated attackers
bypass authentication

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.1%

The Customer Email Verification for WooCommerce plugin for WordPress is vulnerable to Email Verification and Authentication Bypass in all versions up to, and including, 2.7.4 via the use of insufficiently random activation code. This makes it possible for unauthenticated attackers to bypass the email verification, and if both the “Login the user automatically after the account is verified” and “Verify account for current users” options are checked, then it potentially makes it possible for attackers to bypass authentication for other users.

CNA Affected

[
  {
    "vendor": "algoritmika",
    "product": "Customer Email Verification for WooCommerce",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "2.7.4",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.1%

Related for CVELIST:CVE-2024-4185