- Description
- The WPC Shop as a Customer for WooCommerce plugin for WordPress is vulnerable to account takeover and privilege escalation in all versions up to, and including, 1.2.8. This is due to the 'generate_key' function not producing a sufficiently random value. This makes it possible for authenticated attackers, with Subscriber-level access and above, to log in as site administrators, granted they have triggered the ajax_login() function which generates a unique key that can be used to log in.
- Source
- security@wordfence.com
- NVD status
- Received
CVSS 3.1
- Type
- Primary
- Base score
- 8.1
- Impact score
- 5.9
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- security@wordfence.com
- CWE-330
- Hype score
- Not currently trending
CVE-2024-12432 (CVSS:8.1, HIGH) is Awaiting Analysis. The WPC Shop as a Customer for WooCommerce plugin for WordPress is vulnerable to account takeover and privilege escalati..https://t.co/fIvujv6ToD #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
23 Dec 2024
36 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-12432 Account Takeover and Privilege Escalation in WooCommerce Plugin 1.2.8 The WPC Shop as a Customer plugin for WooCommerce on WordPress has a vulnerability. This affects all versions up to 1.2.8. The ... https://t.co/U7aoEycvnk
@VulmonFeeds
18 Dec 2024
48 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-12432 The WPC Shop as a Customer for WooCommerce plugin for WordPress is vulnerable to account takeover and privilege escalation in all versions up to, and including, 1.2.8… https://t.co/20ZCiu9dbx
@CVEnew
18 Dec 2024
511 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes