First published: Wed Mar 13 2024(Updated: )
The SMS Alert Order Notifications – WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.6.9. This is due to missing or incorrect nonce validation on the processBulkAction function. This makes it possible for unauthenticated attackers to delete pages and posts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress SMS Alert Order Notifications – WooCommerce | <3.7.0 | |
WooCommerce SMS Alert Order Notifications | <=3.6.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1489 is considered a moderate severity vulnerability due to the risk of Cross-Site Request Forgery.
To fix CVE-2024-1489, update the SMS Alert Order Notifications plugin to version 3.7.0 or higher.
CVE-2024-1489 affects all versions of the WooCommerce SMS Alert Order Notifications plugin up to and including 3.6.9.
CVE-2024-1489 is a Cross-Site Request Forgery (CSRF) vulnerability.
Yes, unauthenticated attackers can exploit CVE-2024-1489 due to missing or incorrect nonce validation.