Vulnerabilites related to Webkul - WooCommerce Point of Sale
CVE-2024-11281 (GCVE-0-2024-11281)
Vulnerability from cvelistv5
Published
2024-12-25 06:42
Modified
2024-12-26 19:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-862 - Missing Authorization
Summary
The WooCommerce Point of Sale plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 6.1.0. This is due to insufficient validation on the 'logged_in_user_id' value when option values are empty and the ability for attackers to change the email of arbitrary user accounts. This makes it possible for unauthenticated attackers to change the email of arbitrary user accounts, including administrators, and reset their password to gain access to the account.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Webkul | WooCommerce Point of Sale |
Version: * ≤ 6.1.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-11281", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-26T19:56:25.993011Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-26T19:56:40.194Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WooCommerce Point of Sale", "vendor": "Webkul", "versions": [ { "lessThanOrEqual": "6.1.0", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Tonn" } ], "descriptions": [ { "lang": "en", "value": "The WooCommerce Point of Sale plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 6.1.0. This is due to insufficient validation on the \u0027logged_in_user_id\u0027 value when option values are empty and the ability for attackers to change the email of arbitrary user accounts. This makes it possible for unauthenticated attackers to change the email of arbitrary user accounts, including administrators, and reset their password to gain access to the account." } ], "metrics": [ { "cvssV3_1": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-25T06:42:12.979Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2a0671b1-1414-4315-8a2d-bd1aabe091a4?source=cve" }, { "url": "https://codecanyon.net/item/wordpress-woocommerce-pos-system-point-of-sale/21254976" } ], "timeline": [ { "lang": "en", "time": "2024-12-24T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "WooCommerce Point of Sale \u003c= 6.1.0 - Insecure Direct Object Reference to Privilege Escalation via Arbitrary User Email Change" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-11281", "datePublished": "2024-12-25T06:42:12.979Z", "dateReserved": "2024-11-15T19:50:19.764Z", "dateUpdated": "2024-12-26T19:56:40.194Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }