8.8
CVE-2022-0215
- EPSS 0.32%
- Veröffentlicht 18.01.2022 17:15:10
- Zuletzt bearbeitet 21.11.2024 06:38:09
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Waitlist Woocommerce ( Back in stock notifier ) <= 2.5.1 - Cross-Site Request Forgery to Arbitrary Options Update
Login/Signup Popup <= 2.2 - Cross-Site Request Forgery to Arbitrary Options Update
Side Cart Woocommerce (Ajax) <= 2.0 - Cross-Site Request Forgery to Arbitrary Options Update
The Login/Signup Popup, Waitlist Woocommerce ( Back in stock notifier ), and Side Cart Woocommerce (Ajax) WordPress plugins by XootiX are vulnerable to Cross-Site Request Forgery via the save_settings function found in the ~/includes/xoo-framework/admin/class-xoo-admin-settings.php file which makes it possible for attackers to update arbitrary options on a site that can be used to create an administrative user account and grant full privileged access to a compromised site. This affects versions <= 2.2 in Login/Signup Popup, versions <= 2.5.1 in Waitlist Woocommerce ( Back in stock notifier ), and versions <= 2.0 in Side Cart Woocommerce (Ajax).
Mögliche Gegenmaßnahme
Waitlist Woocommerce ( Back in stock notifier ): Update to version 2.5.2, or a newer patched version
Login & Register Customizer – Popup | Slider | Inline | WooCommerce: Update to version 2.3, or a newer patched version
Side Cart Woocommerce | Woocommerce Cart: Update to version 2.1, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Waitlist Woocommerce ( Back in stock notifier )
Version
* - 2.5.1
SystemWordPress Plugin
≫
Produkt
Login & Register Customizer – Popup | Slider | Inline | WooCommerce
Version
* - 2.2
SystemWordPress Plugin
≫
Produkt
Side Cart Woocommerce | Woocommerce Cart
Version
* - 2.0
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Xootix ≫ Login/signup Popup SwPlatformwordpress Version <= 2.2
Xootix ≫ Side Cart Woocommerce SwPlatformwordpress Version <= 2.0
Xootix ≫ Waitlist Woocommerce SwPlatformwordpress Version <= 2.5.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.32% | 0.544 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
| security@wordfence.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.