4.9
CVE-2021-32790
- EPSS 2.01%
- Published 26.07.2021 17:15:08
- Last modified 21.11.2024 06:07:44
- Source security-advisories@github.com
- Teams watchlist Login
- Open Login
Woocommerce is an open source eCommerce plugin for WordPress. An SQL injection vulnerability impacts all WooCommerce sites running the WooCommerce plugin between version 3.3.0 and 3.3.6. Malicious actors (already) having admin access, or API keys to the WooCommerce site can exploit vulnerable endpoints of `/wp-json/wc/v3/webhooks`, `/wp-json/wc/v2/webhooks` and other webhook listing API. Read-only SQL queries can be executed using this exploit, while data will not be returned, by carefully crafting `search` parameter information can be disclosed using timing and related attacks. Version 3.3.6 is the earliest version of Woocommerce with a patch for this vulnerability. There are no known workarounds other than upgrading.
Data is provided by the National Vulnerability Database (NVD)
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 3.3.0 < 3.3.6
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 3.4.0 < 3.4.8
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 3.5.0 < 3.5.9
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 3.6.0 < 3.6.6
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 3.7.0 < 3.7.2
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 3.8.0 < 3.8.2
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 3.9.0 < 3.9.4
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 4.0.0 < 4.0.2
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 4.1.0 < 4.1.2
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 4.2.0 < 4.2.3
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 4.3.0 < 4.3.4
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 4.4.0 < 4.4.2
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 4.5.0 < 4.5.3
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 4.6.0 < 4.6.3
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 4.7.0 < 4.7.2
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 4.8.0 < 4.8.1
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 4.9.0 < 4.9.3
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 5.0.0 < 5.0.1
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 5.1.0 < 5.1.1
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 5.2.0 < 5.2.3
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 5.3.0 < 5.3.1
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 5.4.0 < 5.4.2
Woocommerce ≫ Woocommerce SwPlatformwordpress Version >= 5.5.0 < 5.5.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 2.01% | 0.83 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.9 | 1.2 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
|
nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:P/I:N/A:N
|
security-advisories@github.com | 4.9 | 1.2 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
|
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.