First published: Wed Apr 24 2024(Updated: )
Improper Authentication vulnerability in Mestres do WP Checkout Mestres WP allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Checkout Mestres WP: from n/a through 7.1.9.7.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mestres Checkout | <=7.1.9.7 | |
Mestres Checkout | <=7.1.9.7 |
Update to 7.1.9.8 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51471 is classified as an improper authentication vulnerability impacting certain versions of the Checkout Mestres WP plugin.
To fix CVE-2023-51471, update the Checkout Mestres WP plugin to version 7.1.9.8 or later.
CVE-2023-51471 affects versions of Checkout Mestres WP from n/a through 7.1.9.7.
CVE-2023-51471 is categorized as an improper authentication vulnerability that allows unauthorized access to certain functionalities.
The vendor of CVE-2023-51471 is Mestres, which develops the Checkout Mestres WP plugin.