First published: Wed Apr 03 2024(Updated: )
The WooCommerce Cart Abandonment Recovery WordPress plugin before 1.2.27 does not have CSRF check in its bulk actions, which could allow attackers to make logged in admins delete arbitrary email templates as well as delete and unsubscribe users from abandoned orders via CSRF attacks.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
CartFlows WooCommerce Cart Abandonment Recovery for WordPress | <1.2.27 | |
CartFlows WooCommerce Cart Abandonment Recovery for WordPress | <1.2.27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-2322 is classified as medium due to the potential for unauthorized actions by attackers.
To fix CVE-2024-2322, update the WooCommerce Cart Abandonment Recovery plugin to version 1.2.27 or later.
CVE-2024-2322 can facilitate CSRF attacks that allow attackers to delete email templates and unsubscribe users from abandoned orders.
Logged-in administrators using WooCommerce Cart Abandonment Recovery versions before 1.2.27 are affected by CVE-2024-2322.
CVE-2024-2322 specifically poses a risk only to users with administrative access to the WooCommerce Cart Abandonment Recovery plugin.