Looking for the vulnerability index of Invicti's legacy products?
WooCommerce Payments Authentication Bypass and Privilege Escalation - Vulnerability Database

WooCommerce Payments Authentication Bypass and Privilege Escalation

Description

The WooCommerce Payments plugin versions 4.8.0 through 5.6.1 contain a critical authentication bypass vulnerability in the 'determine_current_user_for_platform_checkout' function. This flaw allows unauthenticated attackers to impersonate any user account, including administrators, without providing valid credentials. The vulnerability stems from improper validation of user identity during the platform checkout process, enabling attackers to execute actions with the privileges of the impersonated user, potentially resulting in complete site compromise.

Remediation

Immediately update the WooCommerce Payments plugin to version 5.6.2 or later, which addresses this vulnerability. Follow these steps:

1. Update the Plugin: Navigate to WordPress Admin Dashboard > Plugins > Installed Plugins, locate WooCommerce Payments, and click 'Update Now'. Alternatively, download the latest version from the official WordPress plugin repository.

2. Verify the Update: After updating, confirm the plugin version is 5.6.2 or higher in the plugin details.

3. Audit User Accounts: Review all user accounts, especially administrators, for any suspicious or unauthorized accounts created during the vulnerability window. Remove any unrecognized accounts.

4. Review Site Logs: Examine server access logs and WordPress activity logs for unusual authentication patterns or unauthorized access attempts between the dates your site ran vulnerable versions.

5. Reset Credentials: If you suspect exploitation, reset passwords for all administrative users and rotate API keys and secrets used by WooCommerce Payments.

6. Enable Auto-Updates: Configure automatic updates for the WooCommerce Payments plugin to prevent future exposure to known vulnerabilities.

Related Vulnerabilities