7.5

CVE-2024-13528

Customer Email Verification for WooCommerce <= 2.9.5 - Authentication Bypass via Shortcode

Customer Email Verification for WooCommerce <= 2.9.5 - Authentication Bypass via Shortcode

The Customer Email Verification for WooCommerce plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.9.5. This is due to the presence of a shortcode that will generate a confirmation link with a placeholder email. This makes it possible for authenticated attackers, with Contributor-level access and above, to generate a verification link for any unverified user and log into the account. The 'Fine tune placement' option must be enabled in the plugin settings in order to exploit the vulnerability.
Mögliche Gegenmaßnahme
Customer Email Verification for WooCommerce: Update to version 2.9.6, or a newer patched version
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
WpfactoryCustomer Email Verification For Woocommerce SwPlatformwordpress Version < 2.9.6
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Customer Email Verification for WooCommerce
Version *-2.9.5
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.23
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 1.6 5.9
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
security@wordfence.com 7.5 1.6 5.9
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.