ID |
CVE-2024-13528
|
Sažetak |
The Customer Email Verification for WooCommerce plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.9.5. This is due to the presence of a shortcode that will generate a confirmation link with a placeholder email. This makes it possible for authenticated attackers, with Contributor-level access and above, to generate a verification link for any unverified user and log into the account. The 'Fine tune placement' option must be enabled in the plugin settings in order to exploit the vulnerability. |
Reference |
|
CVSS |
Base: | 7.5 |
Impact: | 5.9 |
Exploitability: | 1.6 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
HIGH |
LOW |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
HIGH |
HIGH |
HIGH |
|
CVSS vektor |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
Zadnje važnije ažuriranje |
18-02-2025 - 18:53 |
Objavljeno |
12-02-2025 - 10:15 |