First published: Wed Jun 07 2023(Updated: )
The Welcart e-Commerce plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the download_orderdetail_list(), change_orderlist(), and download_member_list() functions called via admin_init hooks in versions up to, and including, 2.2.7. This makes it possible for unauthenticated attackers to download lists of members, products and orders.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Collne Welcart | <=2.2.7 | |
Welcart Plugin | <=2.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4355 is a vulnerability in the Welcart e-Commerce plugin for WordPress that allows authorization bypass due to missing capability checks on certain functions.
CVE-2021-4355 has a severity keyword of 'high' and a severity value of 5.3.
Versions up to and including 2.2.7 of the Welcart e-Commerce plugin for WordPress are affected by CVE-2021-4355.
To fix CVE-2021-4355, you should update the Welcart e-Commerce plugin for WordPress to version 2.2.8 or later.
You can find more information about CVE-2021-4355 at the following references: [1] https://blog.nintechnet.com/wordpress-welcart-e-commerce-plugin-fixed-vulnerabilities/ [2] https://www.wordfence.com/threat-intel/vulnerabilities/id/671f5ba5-1f18-49fa-aa97-eaebdb3417bb?source=cve