7.5
CVE-2024-13694
- EPSS 0.24%
- Veröffentlicht 30.01.2025 09:15:08
- Zuletzt bearbeitet 04.02.2025 18:47:41
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
WooCommerce Wishlist <= 1.8.7 - Unauthenticated Wishlist Disclosure via download_pdf_file Function
The WooCommerce Wishlist (High customization, fast setup,Free Elementor Wishlist, most features) plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.8.7 via the download_pdf_file() function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to extract data from wishlists that they should not have access to.
Mögliche Gegenmaßnahme
MoreConvert Wishlist for WooCommerce: Update to version 1.8.8, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
MoreConvert Wishlist for WooCommerce
Version
*-1.8.7
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Moreconvert ≫ Woocommerce Wishlist SwPlatformwordpress Version < 1.8.8
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.24% | 0.461 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-285 Improper Authorization
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
CWE-639 Authorization Bypass Through User-Controlled Key
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.