7.5

CVE-2021-32789

WooCommerce Blocks < 5.5 - Authenticated Blind SQL Injection

woocommerce-gutenberg-products-block is a feature plugin for WooCommerce Gutenberg Blocks. An SQL injection vulnerability impacts all WooCommerce sites running the WooCommerce Blocks feature plugin between version 2.5.0 and prior to version 2.5.16. Via a carefully crafted URL, an exploit can be executed against the `wc/store/products/collection-data?calculate_attribute_counts[][taxonomy]` endpoint that allows the execution of a read only sql query. There are patches for many versions of this package, starting with version 2.5.16. There are no known workarounds aside from upgrading.
Mögliche Gegenmaßnahme
WooCommerce Blocks: Update to one of the following versions, or a newer patched version: 2.5.16, 2.6.2, 2.7.2, 2.8.1, 2.9.1, 3.0.1, 3.1.1, 3.2.1, 3.3.1, 3.4.1, 3.5.1, 3.6.1, 3.7.2, 3.8.1, 3.9.1, 4.0.1, 4.1.1, 4.2.1, 4.3.1, 4.4.3, 4.5.3, 4.6.1, 4.7.1, 4.8.1, 4.9.2, 5.0.1, 5.1.1, 5.2.1, 5.3.2, 5.4.1, 5.5.1
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt WooCommerce Blocks
Version * - 2.5.15
Version 2.6 - 2.6.1
Version 2.7 - 2.7.1
Version 2.8
Version 2.9
Version 3.0
Version 3.1
Version 3.2
Version 3.3
Version 3.4
Version 3.5
Version 3.6
Version 3.7 - 3.7.1
Version 3.8
Version 3.9
Version 4.0
Version 4.1
Version 4.2
Version 4.3
Version 4.4 - 4.4.2
Version 4.5 - 4.5.2
Version 4.6
Version 4.7
Version 4.8
Version 4.9 - 4.9.1
Version 5.0
Version 5.1
Version 5.2
Version 5.3 - 5.3.1
Version 5.4
Version 5.5
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 2.5.0 < 2.5.16
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 2.6.0 < 2.6.2
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 2.7.0 < 2.7.2
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 2.8.0 < 2.8.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 2.9.0 < 2.9.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 3.0.0 < 3.0.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 3.1.0 < 3.1.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 3.2.0 < 3.2.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 3.3.0 < 3.3.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 3.4.0 < 3.4.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 3.5.0 < 3.5.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 3.6.0 < 3.6.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 3.7.0 < 3.7.2
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 3.8.0 < 3.8.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 3.9.0 < 3.9.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 4.0.0 < 4.0.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 4.1.0 < 4.1.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 4.2.0 < 4.2.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 4.3.0 < 4.3.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 4.4.0 < 4.4.3
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 4.5.0 < 4.5.3
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 4.6.0 < 4.6.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 4.7.0 < 4.7.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 4.8.0 < 4.8.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 4.9.0 < 4.9.2
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 5.0.0 < 5.0.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 5.1.0 < 5.1.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 5.2.0 < 5.2.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 5.3.0 < 5.3.2
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 5.4.0 < 5.4.1
AutomatticWoocommerce Blocks SwPlatformwordpress Version >= 5.5.0 < 5.5.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 92.38% 0.997
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:P/I:N/A:N
security-advisories@github.com 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.