Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hhr2-4cvp-f289

Опубликовано: 18 дек. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 8.1

Описание

The WPC Shop as a Customer for WooCommerce plugin for WordPress is vulnerable to account takeover and privilege escalation in all versions up to, and including, 1.2.8. This is due to the 'generate_key' function not producing a sufficiently random value. This makes it possible for authenticated attackers, with Subscriber-level access and above, to log in as site administrators, granted they have triggered the ajax_login() function which generates a unique key that can be used to log in.

The WPC Shop as a Customer for WooCommerce plugin for WordPress is vulnerable to account takeover and privilege escalation in all versions up to, and including, 1.2.8. This is due to the 'generate_key' function not producing a sufficiently random value. This makes it possible for authenticated attackers, with Subscriber-level access and above, to log in as site administrators, granted they have triggered the ajax_login() function which generates a unique key that can be used to log in.

EPSS

Процентиль: 47%
0.00245
Низкий

8.1 High

CVSS3

Дефекты

CWE-330

Связанные уязвимости

CVSS3: 8.1
nvd
около 1 года назад

The WPC Shop as a Customer for WooCommerce plugin for WordPress is vulnerable to account takeover and privilege escalation in all versions up to, and including, 1.2.8. This is due to the 'generate_key' function not producing a sufficiently random value. This makes it possible for authenticated attackers, with Subscriber-level access and above, to log in as site administrators, granted they have triggered the ajax_login() function which generates a unique key that can be used to log in.

EPSS

Процентиль: 47%
0.00245
Низкий

8.1 High

CVSS3

Дефекты

CWE-330