CVE-2022-1020
Woo Product Table < 3.1.2 - Unauthenticated Arbitrary Function Call
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The Product Table for WooCommerce (wooproducttable) WordPress plugin before 3.1.2 does not have authorisation and CSRF checks in the wpt_admin_update_notice_option AJAX action (available to both unauthenticated and authenticated users), as well as does not validate the callback parameter, allowing unauthenticated attackers to call arbitrary functions with either none or one user controlled argument
El plugin Product Table for WooCommerce (wooproducttable) de WordPress versiones anteriores a 3.1.2, no presenta comprobaciones de autorización y de tipo CSRF en la acción AJAX wpt_admin_update_notice_option (disponible tanto para usuarios no autenticados como autenticados), así como no comprueba el parámetro de devolución de llamada, lo que permite a atacantes no autenticados llamar a funciones arbitrarias con ninguno o un argumento controlado por el usuario
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-03-18 CVE Reserved
- 2022-03-22 CVE Published
- 2024-08-02 CVE Updated
- 2024-08-02 First Exploit
- 2025-01-01 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
- CWE-862: Missing Authorization
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://wpscan.com/vulnerability/04fe89b3-8ad1-482f-a96d-759d1d3a0dd5 | 2024-08-02 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Codeastrology Search vendor "Codeastrology" | Woo Product Table Search vendor "Codeastrology" for product "Woo Product Table" | < 3.1.2 Search vendor "Codeastrology" for product "Woo Product Table" and version " < 3.1.2" | wordpress |
Affected
|