WordPress Plugin Vulnerabilities

User Email Verification for WooCommerce <= 3.5.0 - Authentication bypass via weak token generation

Description

The plugin uses a weak random token when resending email address verifications, allowing an unauthenticated attacker to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts. Furthermore, if the Allow Automatic Login After Successful Verification setting is enabled, the attacker will be directly logged in as the impersonated user account.

Affects Plugins

References

Classification

Type
INSUFFICIENT CRYPTOGRAPHY
CWE
CVSS

Miscellaneous

Original Researcher
Lana Codes
Verified
No

Timeline

Publicly Published
2023-06-02 (about 11 months ago)
Added
2023-06-03 (about 11 months ago)
Last Updated
2023-06-03 (about 11 months ago)

Other