WordPress Plugin Vulnerabilities
User Email Verification for WooCommerce <= 3.5.0 - Authentication bypass via weak token generation
Description
The plugin uses a weak random token when resending email address verifications, allowing an unauthenticated attacker to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts. Furthermore, if the Allow Automatic Login After Successful Verification setting is enabled, the attacker will be directly logged in as the impersonated user account.
Affects Plugins
References
Classification
Type
INSUFFICIENT CRYPTOGRAPHY
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Lana Codes
Verified
No
WPVDB ID
Timeline
Publicly Published
2023-06-02 (about 11 months ago)
Added
2023-06-03 (about 11 months ago)
Last Updated
2023-06-03 (about 11 months ago)