CVE-2024-13528

The Customer Email Verification for WooCommerce plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.9.5. This is due to the presence of a shortcode that will generate a confirmation link with a placeholder email. This makes it possible for authenticated attackers, with Contributor-level access and above, to generate a verification link for any unverified user and log into the account. The 'Fine tune placement' option must be enabled in the plugin settings in order to exploit the vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpfactory:customer_email_verification_for_woocommerce:*:*:*:*:*:wordpress:*:*

History

18 Feb 2025, 18:53

Type Values Removed Values Added
CPE cpe:2.3:a:wpfactory:customer_email_verification_for_woocommerce:*:*:*:*:*:wordpress:*:*
CWE CWE-287 NVD-CWE-noinfo
First Time Wpfactory customer Email Verification For Woocommerce
Wpfactory
References () https://plugins.trac.wordpress.org/browser/emails-verification-for-woocommerce/tags/2.9.2/includes/class-alg-wc-ev-emails.php#L151 - () https://plugins.trac.wordpress.org/browser/emails-verification-for-woocommerce/tags/2.9.2/includes/class-alg-wc-ev-emails.php#L151 - Product
References () https://plugins.trac.wordpress.org/changeset/3238136/ - () https://plugins.trac.wordpress.org/changeset/3238136/ - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/0b3798e3-45fe-4829-9012-dc728d4af87f?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/0b3798e3-45fe-4829-9012-dc728d4af87f?source=cve - Third Party Advisory

12 Feb 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-12 10:15

Updated : 2025-02-18 18:53


NVD link : CVE-2024-13528

Mitre link : CVE-2024-13528


JSON object : View

Products Affected

wpfactory

  • customer_email_verification_for_woocommerce