The Easy Digital Downloads plugin for WordPress is vulnerable to Improper Authorization in versions 3.1 through 3.3.4. This is due to a lack of sufficient validation checks within the 'verify_guest_email' function to ensure the requesting user is the intended recipient of the purchase receipt. This makes it possible for unauthenticated attackers to bypass intended security restrictions and view the receipts of other users, which contains a link to download paid content. Successful exploitation requires knowledge of another customers email address as well as the file ID of the content they purchased.
Metrics
Affected Vendors & Products
References
History
Fri, 07 Feb 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Awesomemotive
Awesomemotive easy Digital Downloads |
|
CPEs | cpe:2.3:a:awesomemotive:easy_digital_downloads:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Awesomemotive
Awesomemotive easy Digital Downloads |
Tue, 17 Dec 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 17 Dec 2024 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Easy Digital Downloads plugin for WordPress is vulnerable to Improper Authorization in versions 3.1 through 3.3.4. This is due to a lack of sufficient validation checks within the 'verify_guest_email' function to ensure the requesting user is the intended recipient of the purchase receipt. This makes it possible for unauthenticated attackers to bypass intended security restrictions and view the receipts of other users, which contains a link to download paid content. Successful exploitation requires knowledge of another customers email address as well as the file ID of the content they purchased. | |
Title | Easy Digital Downloads 3.1 - 3.3.4 - Improper Authorization to Paywall Bypass | |
Weaknesses | CWE-863 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2024-12-17T11:10:18.973Z
Updated: 2024-12-17T17:29:09.742Z
Reserved: 2024-10-08T19:39:51.722Z
Link: CVE-2024-9654

Updated: 2024-12-17T15:25:06.384Z

Status : Analyzed
Published: 2024-12-17T12:15:21.157
Modified: 2025-02-07T17:08:58.940
Link: CVE-2024-9654

No data.