First published: Fri Oct 20 2023(Updated: )
The WooCommerce EAN Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the refresh_order_ean_data AJAX action in versions up to 6.1.0. This makes it possible for authenticated attackers with contributor-level access and above, to update EAN numbers for orders.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
<6.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-4947.
The severity of CVE-2023-4947 is medium with a severity value of 4.3.
The vulnerability occurs due to a missing capability check on the refresh_order_ean_data AJAX action.
Authenticated attackers with contributor-level access and above can exploit this vulnerability.
Update to a version higher than 6.1.0 of the WooCommerce EAN Payment Gateway plugin to fix this vulnerability.