Lucene search

K
wpvulndbWpvulndbWPVDB-ID:8EDC17AD-FDD6-44A9-A3C6-CFFF0164F13A
HistoryMay 03, 2024 - 12:00 a.m.

Customer Email Verification for WooCommerce < 2.7.5 - Authentication Bypass

2024-05-0300:00:00
wpscan.com
4
woocommerce
wordpress
email verification
authentication bypass
vulnerability
activation code
unauthenticated attackers
user authentication

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

27.1%

Description The Customer Email Verification for WooCommerce plugin for WordPress is vulnerable to Email Verification and Authentication Bypass in all versions up to, and including, 2.7.4 via the use of insufficiently random activation code. This makes it possible for unauthenticated attackers to bypass the email verification, and if both the “Login the user automatically after the account is verified” and “Verify account for current users” options are checked, then it potentially makes it possible for attackers to bypass authentication for other users.

CPENameOperatorVersion
eq2.7.5

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

27.1%

Related for WPVDB-ID:8EDC17AD-FDD6-44A9-A3C6-CFFF0164F13A