7.5
CVE-2023-5132
- EPSS 1.23%
- Veröffentlicht 21.10.2023 02:15:07
- Zuletzt bearbeitet 21.11.2024 08:41:07
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Soisy Pagamento Rateale <= 6.0.1 - Missing Authorization to Sensitive Information Exposure
The Soisy Pagamento Rateale plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the parseRemoteRequest function in versions up to, and including, 6.0.1. This makes it possible for unauthenticated attackers with knowledge of an existing WooCommerce Order ID to expose sensitive WooCommerce order information (e.g., Name, Address, Email Address, and other order metadata).
Mögliche Gegenmaßnahme
Soisy Pagamento Rateale: Update to version 6.0.2, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Soisy Pagamento Rateale
Version
*-6.0.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Soisy ≫ Soisy Pagamento Rateale SwPlatformwordpress Version <= 6.0.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.23% | 0.786 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
| security@wordfence.com | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-862 Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.