CVE-2024-7503
Wpwebelite
CVE-2024-7503: Authentication bypass vulnerability in the WooCommerce - Social Login plugin for WordPress, versions 2.7.5 and earlier. This flaw allows unauthenticated attackers to potentially log in as any user, including administrators, if they possess the userID and the email module is active. The vulnerability stems from insecure comparison of activation codes within the 'woo_slg_confirm_email_user' function. Even though the CVSS score is 0, indicating minimal base severity, the presence of "In The Wild" tag suggests active exploitation. With an SVRS of 30, it's classified as low risk, but continuous monitoring is advisable due to potential escalation if threat actors actively target this WooCommerce plugin flaw. This vulnerability could lead to complete site compromise and data breaches. Immediate patching is advisable to mitigate risks.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.