Vulnerability Description
The ECPay Ecommerce for WooCommerce plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'clear_ecpay_debug_log' AJAX action in all versions up to, and including, 1.1.2411060. This makes it possible for authenticated attackers, with Subscriber-level access and above, to clear the plugin's log files.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ecpay | Ecpay Ecommerce For Woocommerce | <= 1.1.2411060 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old
- https://wordpress.org/plugins/ecpay-ecommerce-for-woocommerce/Product
- https://www.wordfence.com/threat-intel/vulnerabilities/id/5ae08e0b-ea17-46c1-aadThird Party Advisory
FAQ
What is CVE-2024-13652?
CVE-2024-13652 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The ECPay Ecommerce for WooCommerce plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'clear_ecpay_debug_log' AJAX action in all versions up to, ...
How severe is CVE-2024-13652?
CVE-2024-13652 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-13652?
Check the references section above for vendor advisories and patch information. Affected products include: Ecpay Ecpay Ecommerce For Woocommerce.