Authentication bypass in Bot for Telegram on WooCommerce for WordPress



Published: 2024-10-17
Risk High
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2024-9821
CWE-ID CWE-862
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Bot for Telegram on WooCommerce
Web applications / Modules and components for CMS

Vendor Guru Team

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Missing Authorization

EUVDB-ID: #VU98790

Risk: High

CVSSv3.1: 8.1 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2024-9821

CWE-ID: CWE-862 - Missing Authorization

Exploit availability: No

Description

The vulnerability allows a remote user to compromise the website.

The vulnerability exists due to missing authorization on the "stm_wpcfto_get_settings" AJAX action. A remote authenticated user can obtain the secret Telegram token for bot control and use it to login under an arbitrary account on the website, including administrative account via the Login with Telegram feature.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Bot for Telegram on WooCommerce: 1.0.0 - 1.2.4

CPE2.3 External links

http://www.wordfence.com/threat-intel/vulnerabilities/id/a662c904-ba2e-494c-a603-b22eeeddf43d?source=cve
http://plugins.trac.wordpress.org/browser/bot-for-telegram-on-woocommerce/trunk/nuxy/helpers/helpers.php?rev=2575772#L54


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###