First published: Wed Apr 12 2023(Updated: )
An issue in WooCommerce Payments plugin for WordPress (versions 5.6.1 and lower) allows an unauthenticated attacker to send requests on behalf of an elevated user, like administrator. This allows a remote, unauthenticated attacker to gain admin access on a site that has the affected version of the plugin activated.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Automattic Woocommerce Payments | >=4.8.0<4.8.2 | |
Automattic Woocommerce Payments | >=5.0.0<5.0.4 | |
Automattic Woocommerce Payments | >=5.1.0<5.1.3 | |
Automattic Woocommerce Payments | >=5.2.0<5.2.2 | |
Automattic Woocommerce Payments | >=5.5.0<5.5.2 | |
Automattic Woocommerce Payments | >=5.6.0<5.6.2 | |
Automattic Woocommerce Payments | =4.9.0 | |
Automattic Woocommerce Payments | =5.3.0 | |
Automattic Woocommerce Payments | =5.4.0 | |
Automattic Woopayments | >=5.6.0<5.6.2 | |
Automattic Woopayments | =4.9.0 | |
Automattic Woopayments | =5.3.0 | |
Automattic Woopayments | =5.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28121 is a critical vulnerability in the WooCommerce Payments plugin for WordPress (versions 5.6.1 and lower) that allows an unauthenticated attacker to gain admin access.
CVE-2023-28121 is considered critical with a severity score of 9.8.
Versions 5.6.1 and lower of the WooCommerce Payments plugin for WordPress are affected by CVE-2023-28121.
An unauthenticated attacker can exploit CVE-2023-28121 by sending requests on behalf of an elevated user, like administrator, gaining admin access.
Yes, a patch is available for CVE-2023-28121. It is recommended to update to a version that is not affected.