Description
The Soisy Pagamento Rateale plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the parseRemoteRequest function in versions up to, and including, 6.0.1. This makes it possible for unauthenticated attackers with knowledge of an existing WooCommerce Order ID to expose sensitive WooCommerce order information (e.g., Name, Address, Email Address, and other order metadata).
Published: 2023-10-21
Score: 7.5 High
EPSS: 1.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-57470 The Soisy Pagamento Rateale plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the parseRemoteRequest function in versions up to, and including, 6.0.1. This makes it possible for unauthenticated attackers with knowledge of an existing WooCommerce Order ID to expose sensitive WooCommerce order information (e.g., Name, Address, Email Address, and other order metadata).
History

No history.

Subscriptions

Soisy Soisy Pagamento Rateale
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-02-05T18:59:52.312Z

Reserved: 2023-09-22T16:20:49.833Z

Link: CVE-2023-5132

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-10-21T02:15:07.960

Modified: 2024-11-21T08:41:07.540

Link: CVE-2023-5132

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses