The Stripe for WooCommerce WordPress plugin is missing a capability check on the save() function found in the ~/includes/admin/class-wc-stripe-admin-user-edit.php file that makes it possible for attackers to configure their account to use other site users unique STRIPE identifier and make purchases with their payment accounts. This affects versions 3.0.0 - 3.3.9.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/2601162/woo-stripe-payment/trunk/includes/admin/class-wc-stripe-admin-user-edit.php | Patch Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39347 | Third Party Advisory |
https://plugins.trac.wordpress.org/changeset/2601162/woo-stripe-payment/trunk/includes/admin/class-wc-stripe-admin-user-edit.php | Patch Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39347 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/changeset/2601162/woo-stripe-payment/trunk/includes/admin/class-wc-stripe-admin-user-edit.php - Patch, Third Party Advisory | |
References | () https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39347 - Third Party Advisory |
Information
Published : 2021-10-04 18:15
Updated : 2024-11-21 06:19
NVD link : CVE-2021-39347
Mitre link : CVE-2021-39347
CVE.ORG link : CVE-2021-39347
JSON object : View
Products Affected
paymentplugins
- stripe_for_woocommerce
CWE
CWE-862
Missing Authorization