CVE-2023-2986
Abandoned Cart Lite for WooCommerce <= 5.15.1 - Authentication Bypass
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
The Abandoned Cart Lite for WooCommerce plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.14.2. This is due to insufficient encryption on the user being supplied during the abandoned cart link decode through the plugin. This allows unauthenticated attackers to log in as users who have abandoned the cart, who are typically customers. Further security hardening was introduced in version 5.15.1 that ensures sites are no longer vulnerable through historical check-out links, and additional hardening was introduced in version 5.15.2 that ensured null key values wouldn't permit the authentication bypass.
WordPress Abandoned Cart Lite for WooCommerce plugin versions 5.14.2 and below suffer from an authentication bypass vulnerability.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-05-30 CVE Reserved
- 2023-06-06 CVE Published
- 2023-06-14 First Exploit
- 2024-12-17 EPSS Updated
- 2024-12-28 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-288: Authentication Bypass Using an Alternate Path or Channel
CAPEC
References (9)
URL | Date | SRC |
---|---|---|
https://github.com/Ayantaker/CVE-2023-2986 | 2024-12-28 | |
https://github.com/Alucard0x1/CVE-2023-2986 | 2023-06-14 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tychesoftwares Search vendor "Tychesoftwares" | Abandoned Cart Lite For Woocommerce Search vendor "Tychesoftwares" for product "Abandoned Cart Lite For Woocommerce" | <= 5.14.2 Search vendor "Tychesoftwares" for product "Abandoned Cart Lite For Woocommerce" and version " <= 5.14.2" | wordpress |
Affected
|