icon

Digital safety starts here for both commercial and personal Use...

Defend Your Business Against the Latest WNY Cyber Threats We offer Safe, Secure and Affordable Solutions for your Business and Personal Networks and Devices.



WNYCyber is there to help you to choose the best service providers in Western New York... We DO NOT provide the services ourselves, as we are Internet Programmers who have to deak daily with Cyber Threats... (Ugghhh)... So we know what it's like and what it takes to protect OUR and OUR CUSTOMERS DATA... We built this Website to help steer you to those that can give you the best service at realistic and non-inflated prices. We do charge or collect any fees.

Critical Flaw Found in WordPress Plugin for WooCommerce Used by 30,000 Websites

Cyber Security Threat Summary:
“A critical security flaw has been disclosed in the WordPress "Abandoned Cart Lite for WooCommerce" plugin that's installed on more than 30,000 websites. ‘This vulnerability makes it possible for an attacker to gain access to the accounts of users who have abandoned their carts, who are typically customers but can extend to other high-level users when the right conditions are met,’ Defiant's Wordfence said in an advisory. Tracked as CVE-2023-2986, the shortcoming has been rated 9.8 out of 10 for severity on the CVSS scoring system. It impacts all versions of the plugin, including and prior to versions 5.14.2. The problem, at its core, is a case of authentication bypass that arises as a result of insufficient encryption protections that are applied when customers are notified when they have abandoned their shopping carts on e-commerce sites without completing the purchase. Specifically, the encryption key is hard-coded in the plugin, thereby allowing malicious actors to login as a user with an abandoned cart” (The Hacker News, 2023).

Security Officer Comments:
The flaw was addressed by the plugin developer on June 6, 2023, with the release of Abandoned Cart Lite for WooCommerce version 5.15.0. Researchers note that this flaw could be exploited by a threat actor to gain access to an administrative user account, thereby enabling the attacker to take complete control of websites running the vulnerable versions of the plugin. As of writing, WordPress hasn’t mentioned whether this flaw has been exploited in attacks in the wild. However, given the disclosure, it won’t be long before actors leverage the vulnerability in attacks.

Suggested Correction(s):
Administrators of websites running the vulnerable plugin should ensure they update to the latest version as soon as possible to prevent potential attacks.

Link(s):
https://thehackernews.com/2023/06/critical-flaw-found-in-wordpress-plugin.html