Логотип exploitDog
bind:CVE-2023-4947
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-4947

Количество 2

Количество 2

nvd логотип

CVE-2023-4947

больше 2 лет назад

The WooCommerce EAN Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the refresh_order_ean_data AJAX action in versions up to 6.1.0. This makes it possible for authenticated attackers with contributor-level access and above, to update EAN numbers for orders.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-jhg8-jx4g-7x8h

больше 2 лет назад

The WooCommerce EAN Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the refresh_order_ean_data AJAX action in versions up to 6.1.0. This makes it possible for authenticated attackers with contributor-level access and above, to update EAN numbers for orders.

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-4947

The WooCommerce EAN Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the refresh_order_ean_data AJAX action in versions up to 6.1.0. This makes it possible for authenticated attackers with contributor-level access and above, to update EAN numbers for orders.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-jhg8-jx4g-7x8h

The WooCommerce EAN Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the refresh_order_ean_data AJAX action in versions up to 6.1.0. This makes it possible for authenticated attackers with contributor-level access and above, to update EAN numbers for orders.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу