CVE-2024-13925

The Klarna Checkout for WooCommerce WordPress plugin before 2.13.5 exposes an unauthenticated WooCommerce Ajax endpoint that allows an attacker to flood the log files with data at the maximum size allowed for a POST parameter per request. This can result in rapid consumption of disk space, potentially filling the entire disk.
CVSS

No CVSS.

References
Configurations

Configuration 1 (hide)

cpe:2.3:a:klarna:klarna_checkout_for_woocommerce:*:*:*:*:*:wordpress:*:*

History

29 Apr 2025, 19:09

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:klarna:klarna_checkout_for_woocommerce:*:*:*:*:*:wordpress:*:*
First Time Klarna
Klarna klarna Checkout For Woocommerce
References () https://wpscan.com/vulnerability/6aebb52f-d74a-4043-86c4-c24579f24ef4/ - () https://wpscan.com/vulnerability/6aebb52f-d74a-4043-86c4-c24579f24ef4/ - Exploit, Third Party Advisory

17 Apr 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-17 06:15

Updated : 2025-04-29 19:09


NVD link : CVE-2024-13925

Mitre link : CVE-2024-13925


JSON object : View

Products Affected

klarna

  • klarna_checkout_for_woocommerce