7.5
CVE-2024-43315
- EPSS 0.33%
- Veröffentlicht 18.08.2024 22:15:11
- Zuletzt bearbeitet 19.08.2024 12:59:59
- Quelle audit@patchstack.com
- CVE-Watchlists
- Unerledigt
Stripe Payments For WooCommerce by Checkout <= 1.9.1 - Unauthenticated Insecure Direct Object Reference
Authorization Bypass Through User-Controlled Key vulnerability in Checkout Plugins Stripe Payments For WooCommerce by Checkout.This issue affects Stripe Payments For WooCommerce by Checkout: from n/a through 1.9.1.
Mögliche Gegenmaßnahme
Stripe Payments For WooCommerce by Checkout Plugins: Update to version 1.9.2, or a newer patched version
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Stripe Payments For WooCommerce by Checkout Plugins
Version
*-1.9.1
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Herstellercheckoutplugins
≫
Produkt
stripe_payments_for_woocommerce
Default Statusunknown
Version <=
1.9.1
Version
0
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.33% | 0.555 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| audit@patchstack.com | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-639 Authorization Bypass Through User-Controlled Key
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.