Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | N/A |
CWE-ID | CWE-284 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
WooCommerce Blocks Web applications / Modules and components for CMS |
Vendor | Automattic |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU48207
Risk: Medium
CVSSv3.1: 5.5 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote authenticated attacker can create accounts during checkout even when the "Allow customers to create an account during checkout" setting is disabled.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWooCommerce Blocks: 1.0.0 - 3.7.0
External linkshttp://wpscan.com/vulnerability/10460
http://developer.woocommerce.com/2020/11/05/developer-advisory-spam-orders-and-accounts-from-bots/
http://github.com/woocommerce/woocommerce-gutenberg-products-block/pull/3371
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.