7.5

CVE-2023-5132

Soisy Pagamento Rateale <= 6.0.1 - Missing Authorization to Sensitive Information Exposure

The Soisy Pagamento Rateale plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the parseRemoteRequest function in versions up to, and including, 6.0.1. This makes it possible for unauthenticated attackers with knowledge of an existing WooCommerce Order ID to expose sensitive WooCommerce order information (e.g., Name, Address, Email Address, and other order metadata).
Mögliche Gegenmaßnahme
Soisy Pagamento Rateale: Update to version 6.0.2, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Soisy Pagamento Rateale
Version *-6.0.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SoisySoisy Pagamento Rateale SwPlatformwordpress Version <= 6.0.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.23% 0.786
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
security@wordfence.com 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE-862 Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.