CVE-2022-3946
Welcart e-Commerce < 2.8.4 - Subscriber+ Arbitrary Shipping Method Creation/Update/Deletion
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The Welcart e-Commerce WordPress plugin before 2.8.4 does not have authorisation and CSRF in an AJAX action, allowing any logged-in user to create, update and delete shipping methods.
El complemento de WordPress Welcart e-Commerce anterior a 2.8.4 no tiene autorización ni CSRF en una acción AJAX, lo que permite a cualquier usuario que haya iniciado sesión crear, actualizar y eliminar métodos de envío.
The Welcart e-Commerce plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on a function related to an AJAX action in versions up to, and including, 2.8.3. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function resulting in the update/deletion of default shipping methods.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-11-11 CVE Reserved
- 2022-11-21 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
- CWE-862: Missing Authorization
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://wpscan.com/vulnerability/b48e4e1d-e682-4b16-81dc-2feee78d7ed0 | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Collne Search vendor "Collne" | Welcart E-commerce Search vendor "Collne" for product "Welcart E-commerce" | < 2.8.4 Search vendor "Collne" for product "Welcart E-commerce" and version " < 2.8.4" | wordpress |
Affected
|