The PayU CommercePro Plugin plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.8.3. This is due to /wp-json/payu/v1/generate-user-token and /wp-json/payu/v1/get-shipping-cost REST API endpoints not properly verifying a user's identity prior to setting the users ID and auth cookies. This makes it possible for unauthenticated attackers to create new administrative user accounts.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 07 Jan 2025 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The PayU CommercePro Plugin plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.8.3. This is due to /wp-json/payu/v1/generate-user-token and /wp-json/payu/v1/get-shipping-cost REST API endpoints not properly verifying a user's identity prior to setting the users ID and auth cookies. This makes it possible for unauthenticated attackers to create new administrative user accounts. | |
Title | PayU CommercePro Plugin <= 3.8.3 - Unauthenticated Privilege Escalation | |
Weaknesses | CWE-287 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-01-07T04:22:17.945Z
Updated: 2025-01-07T16:20:24.407Z
Reserved: 2024-12-05T16:53:10.945Z
Link: CVE-2024-12264
Vulnrichment
Updated: 2025-01-07T15:57:07.762Z
NVD
Status : Received
Published: 2025-01-07T05:15:17.047
Modified: 2025-01-07T05:15:17.047
Link: CVE-2024-12264
Redhat
No data.