The Soisy Pagamento Rateale plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the parseRemoteRequest function in versions up to, and including, 6.0.1. This makes it possible for unauthenticated attackers with knowledge of an existing WooCommerce Order ID to expose sensitive WooCommerce order information (e.g., Name, Address, Email Address, and other order metadata).
References
Configurations
History
21 Nov 2024, 08:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/browser/soisy-pagamento-rateale/trunk/public/class-soisy-pagamento-rateale-public.php#L465 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/d3c997cd-37b4-4b9c-b99e-397be484aa36?source=cve - Third Party Advisory |
28 Oct 2023, 03:47
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-862 | |
References | (MISC) https://plugins.trac.wordpress.org/browser/soisy-pagamento-rateale/trunk/public/class-soisy-pagamento-rateale-public.php#L465 - Product | |
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/d3c997cd-37b4-4b9c-b99e-397be484aa36?source=cve - Third Party Advisory | |
First Time |
Soisy
Soisy soisy Pagamento Rateale |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:soisy:soisy_pagamento_rateale:*:*:*:*:*:wordpress:*:* |
21 Oct 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-21 02:15
Updated : 2024-11-21 08:41
NVD link : CVE-2023-5132
Mitre link : CVE-2023-5132
CVE.ORG link : CVE-2023-5132
JSON object : View
Products Affected
soisy
- soisy_pagamento_rateale
CWE
CWE-862
Missing Authorization