CVE-2023-4947
CVSS 3.1 Score 4.3 of 10 (medium)
Details
Summary
CVE-2023-4947 is a vulnerability affecting the WooCommerce EAN Payment Gateway plugin for WordPress, specifically versions up to 6.1.0. The vulnerability allows authenticated attackers with contributor-level access or higher to modify data by updating EAN numbers for orders through the refresh_order_ean_data AJAX action. This vulnerability poses a medium risk, with a base severity score of 4.3 out of 10 and an impact score of 1.4 out of 10. The privileges required are low, and there is no user interaction required for exploitation. The attack vector is through the network, and the integrity impact is low while the confidentiality impact is none. To remediate this vulnerability, it is recommended to update to a patched version of the WooCommerce EAN Payment Gateway plugin as soon as it becomes available. Organizations using affected versions should be cautious as unauthorized modification of data can pose potential risks and disruptions to their operations.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions