The WooCommerce EAN Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the refresh_order_ean_data AJAX action in versions up to 6.1.0. This makes it possible for authenticated attackers with contributor-level access and above, to update EAN numbers for orders.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 12 Feb 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Yanco
Yanco woocommerce Ean Payment Gateway
CPEs cpe:2.3:a:wpfactory:ean_for_woocommerce:*:*:*:*:*:wordpress:*:* cpe:2.3:a:yanco:woocommerce_ean_payment_gateway:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpfactory
Wpfactory ean For Woocommerce
Yanco
Yanco woocommerce Ean Payment Gateway

Wed, 05 Feb 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-02-05T19:10:57.709Z

Reserved: 2023-09-13T15:03:45.844Z

Link: CVE-2023-4947

cve-icon Vulnrichment

Updated: 2024-08-02T07:44:53.250Z

cve-icon NVD

Status : Analyzed

Published: 2023-10-20T07:15:16.740

Modified: 2025-02-12T16:02:11.947

Link: CVE-2023-4947

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.