The WooCommerce Point of Sale plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 6.1.0. This is due to insufficient validation on the 'logged_in_user_id' value when option values are empty and the ability for attackers to change the email of arbitrary user accounts. This makes it possible for unauthenticated attackers to change the email of arbitrary user accounts, including administrators, and reset their password to gain access to the account.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Dec 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 25 Dec 2024 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WooCommerce Point of Sale plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 6.1.0. This is due to insufficient validation on the 'logged_in_user_id' value when option values are empty and the ability for attackers to change the email of arbitrary user accounts. This makes it possible for unauthenticated attackers to change the email of arbitrary user accounts, including administrators, and reset their password to gain access to the account. | |
Title | WooCommerce Point of Sale <= 6.1.0 - Insecure Direct Object Reference to Privilege Escalation via Arbitrary User Email Change | |
Weaknesses | CWE-862 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-12-25T06:42:12.979Z
Updated: 2024-12-26T19:56:40.194Z
Reserved: 2024-11-15T19:50:19.764Z
Link: CVE-2024-11281
Vulnrichment
Updated: 2024-12-26T19:56:34.904Z
NVD
Status : Received
Published: 2024-12-25T07:15:11.777
Modified: 2024-12-25T07:15:11.777
Link: CVE-2024-11281
Redhat
No data.