The Multivendor Marketplace Solution for WooCommerce WordPress plugin before 3.8.12 is lacking authorisation and CSRF in multiple AJAX actions, which could allow any authenticated users, such as subscriber to call them and suspend vendors (reporter by the submitter) or update arbitrary order status (identified by WPScan when verifying the issue) for example. Other unauthenticated attacks are also possible, either directly or via CSRF
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/c600dd04-f6aa-430b-aefb-c4c6d554c41a | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/c600dd04-f6aa-430b-aefb-c4c6d554c41a | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/c600dd04-f6aa-430b-aefb-c4c6d554c41a - Exploit, Third Party Advisory |
Information
Published : 2022-09-05 13:15
Updated : 2024-11-21 07:01
NVD link : CVE-2022-2657
Mitre link : CVE-2022-2657
CVE.ORG link : CVE-2022-2657
JSON object : View
Products Affected
wc-marketplace
- multivendor_marketplace_solution_for_woocommerce_-_wc_marketplace