CVE-2023-4947

CVSS 3.1 Score 4.3 of 10 (medium)

Details

Published Oct 20, 2023
Updated: Nov 7, 2023
CWE ID 862

Summary

CVE-2023-4947 is a vulnerability affecting the WooCommerce EAN Payment Gateway plugin for WordPress, specifically versions up to 6.1.0. The vulnerability allows authenticated attackers with contributor-level access or higher to modify data by updating EAN numbers for orders through the refresh_order_ean_data AJAX action. This vulnerability poses a medium risk, with a base severity score of 4.3 out of 10 and an impact score of 1.4 out of 10. The privileges required are low, and there is no user interaction required for exploitation. The attack vector is through the network, and the integrity impact is low while the confidentiality impact is none. To remediate this vulnerability, it is recommended to update to a patched version of the WooCommerce EAN Payment Gateway plugin as soon as it becomes available. Organizations using affected versions should be cautious as unauthorized modification of data can pose potential risks and disruptions to their operations.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-4947 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions