Lucene search

K
nvd[email protected]NVD:CVE-2024-4185
HistoryApr 30, 2024 - 9:15 a.m.

CVE-2024-4185

2024-04-3009:15:07
web.nvd.nist.gov
cve-2024-4185
woocommerce
email verification
authentication bypass
wordpress
insufficiently random activation code
unauthenticated attackers
authentication

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.1%

The Customer Email Verification for WooCommerce plugin for WordPress is vulnerable to Email Verification and Authentication Bypass in all versions up to, and including, 2.7.4 via the use of insufficiently random activation code. This makes it possible for unauthenticated attackers to bypass the email verification, and if both the “Login the user automatically after the account is verified” and “Verify account for current users” options are checked, then it potentially makes it possible for attackers to bypass authentication for other users.

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.1%

Related for NVD:CVE-2024-4185