The Oliver POS – A WooCommerce Point of Sale (POS) plugin for WordPress is vulnerable to unauthorized access due to missing capability checks on several functions hooked via AJAX in the includes/class-pos-bridge-install.php file in all versions up to, and including, 2.4.1.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform several unauthorized actions like deactivating the plugin, disconnecting the subscription, syncing the status and more.
CVSS
No CVSS.
References
Configurations
History
04 Mar 2025, 12:24
Type | Values Removed | Values Added |
---|---|---|
First Time |
Oliverpos
Oliverpos oliver Pos |
|
CPE | cpe:2.3:a:oliverpos:oliver_pos:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/oliver-pos/trunk/includes/class-pos-bridge-install.php#L11 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/b5c6f351-477b-4384-9863-fe3b45ddf21d?source=cve - Third Party Advisory |
29 Feb 2024, 01:43
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-29 01:43
Updated : 2025-03-04 12:24
NVD link : CVE-2024-0702
Mitre link : CVE-2024-0702
JSON object : View
Products Affected
oliverpos
- oliver_pos
CWE
No CWE.