CVE-2023-2179
WooCommerce Order Status Change Notifier <= 1.1.0 - Subscriber+ Arbitrary Order Status Update
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The WooCommerce Order Status Change Notifier WordPress plugin through 1.1.0 does not have authorisation and CSRF when updating status orders via an AJAX action available to any authenticated users, which could allow low privilege users such as subscriber to update arbitrary order status, making them paid without actually paying for them for example
The WooCommerce Order Status Change Notifier plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on an AJAX action in versions up to, and including, 1.1.0. This makes it possible for authenticated attackers with minimal permissions, such as a customer, to modify arbitrary order status and mark orders as paid, for example, when the order isn't actually paid for.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-04-19 CVE Reserved
- 2023-04-19 CVE Published
- 2024-06-16 EPSS Updated
- 2024-08-02 CVE Updated
- 2024-08-02 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-862: Missing Authorization
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://wpscan.com/vulnerability/fbc56973-4225-4f44-8c38-d488e57cd551 | 2024-08-02 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Woocommerce Search vendor "Woocommerce" | Woocommerce Order Status Change Notifier Search vendor "Woocommerce" for product "Woocommerce Order Status Change Notifier" | <= 1.1.0 Search vendor "Woocommerce" for product "Woocommerce Order Status Change Notifier" and version " <= 1.1.0" | wordpress |
Affected
|