First published: Mon Oct 04 2021(Updated: )
The Stripe for WooCommerce WordPress plugin is missing a capability check on the save() function found in the ~/includes/admin/class-wc-stripe-admin-user-edit.php file that makes it possible for attackers to configure their account to use other site users unique STRIPE identifier and make purchases with their payment accounts. This affects versions 3.0.0 - 3.3.9.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paymentplugins Stripe For Woocommerce | >=3.0.0<=3.3.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39347 is a vulnerability in the Stripe for WooCommerce WordPress plugin that allows attackers to configure their account to use other site users' unique STRIPE identifier and make purchases.
The severity of CVE-2021-39347 is medium with a CVSS score of 4.3.
The Stripe for WooCommerce WordPress plugin version 3.0.0 to 3.3.9 is affected by CVE-2021-39347.
An attacker can exploit CVE-2021-39347 by configuring their account to use other site users' unique STRIPE identifier and make purchases.
Yes, a fix for CVE-2021-39347 is available in the latest version of the Stripe for WooCommerce WordPress plugin.