Vulnerability Details CVE-2023-4948
The WooCommerce CVR Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the refresh_order_cvr_data AJAX action in versions up to 6.1.0. This makes it possible for authenticated attackers with contributor-level access and above, to update CVR numbers for orders.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 25.3%
CVSS Severity
CVSS v3 Score 4.3
Products affected by CVE-2023-4948
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:-
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:1.0.0
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:1.1.0
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:1.1.1
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:1.1.2
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:2.0.0
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:2.0.1
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:2.1.0
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:2.2.0
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:2.2.1
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:2.3.0
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:4.0.0
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:4.0.2
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:4.0.3
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:4.1.0
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:4.2.0
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:5.0.0
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:5.0.1
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:5.0.2
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:5.0.3
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:5.0.4
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:6.0.0
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:6.0.1
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:6.0.2
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:6.0.3
-
cpe:2.3:a:yanco:woocommerce_cvr_payment_gateway:6.1.0