CVE-2021-4337
Description
Sixteen XforWooCommerce Add-On Plugins for WordPress are vulnerable to authorization bypass due to a missing capability check on the wp_ajax_svx_ajax_factory function in various versions listed below. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to read, edit, or delete WordPress settings, plugin settings, and to arbitrarily list all users on a WordPress website. The plugins impacted are: Product Filter for WooCommerce < 8.2.0, Improved Product Options for WooCommerce < 5.3.0, Improved Sale Badges for WooCommerce < 4.4.0, Share, Print and PDF Products for WooCommerce < 2.8.0, Product Loops for WooCommerce < 1.7.0, XforWooCommerce < 1.7.0, Package Quantity Discount < 1.2.0, Price Commander for WooCommerce < 1.3.0, Comment and Review Spam Control for WooCommerce < 1.5.0, Add Product Tabs for WooCommerce < 1.5.0, Autopilot SEO for WooCommerce < 1.6.0, Floating Cart < 1.3.0, Live Search for WooCommerce < 2.1.0, Bulk Add to Cart for WooCommerce < 1.3.0, Live Product Editor for WooCommerce < 4.7.0, and Warranties and Returns for WooCommerce < 5.3.0.
Affected products
16- cpe:2.3:a:xforwoocommerce:add_product_tabs:*:*:*:*:*:wordpress:*:*Range: <1.5.0
- cpe:2.3:a:xforwoocommerce:autopilot_seo:*:*:*:*:*:wordpress:*:*Range: <1.6.0
- cpe:2.3:a:xforwoocommerce:bulk_add_to_cart:*:*:*:*:*:wordpress:*:*Range: <1.3.0
- cpe:2.3:a:xforwoocommerce:comment_and_review_spam_control:*:*:*:*:*:wordpress:*:*Range: <1.5.0
- cpe:2.3:a:xforwoocommerce:floating_cart:*:*:*:*:*:wordpress:*:*Range: <1.3.0
- cpe:2.3:a:xforwoocommerce:improved_product_options:*:*:*:*:*:wordpress:*:*Range: <5.3.0
- cpe:2.3:a:xforwoocommerce:improved_sale_badges:*:*:*:*:*:wordpress:*:*Range: <4.4.0
- cpe:2.3:a:xforwoocommerce:live_product_editor:*:*:*:*:*:wordpress:*:*Range: <4.7.0
- cpe:2.3:a:xforwoocommerce:live_search:*:*:*:*:*:wordpress:*:*Range: <2.1.0
- cpe:2.3:a:xforwoocommerce:package_quantity:*:*:*:*:*:wordpress:*:*Range: <1.2.0
- cpe:2.3:a:xforwoocommerce:price_commander:*:*:*:*:*:wordpress:*:*Range: <1.3.0
- cpe:2.3:a:xforwoocommerce:product_filter:*:*:*:*:*:wordpress:*:*Range: <8.2.0
- cpe:2.3:a:xforwoocommerce:product_loops:*:*:*:*:*:wordpress:*:*Range: <1.7.0
- cpe:2.3:a:xforwoocommerce:share\,_print_and_pdf_products:*:*:*:*:*:wordpress:*:*Range: <2.8.0
- cpe:2.3:a:xforwoocommerce:warranties_and_returns:*:*:*:*:*:wordpress:*:*Range: <5.3.0
- cpe:2.3:a:xforwoocommerce:xforwoocommerce:*:*:*:*:*:wordpress:*:*Range: <1.7.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- blog.nintechnet.com/16-woocommerce-product-add-ons-plugins-fixed-vulnerabilities/nvdExploitThird Party Advisory
- www.wordfence.com/threat-intel/vulnerabilities/id/05481984-7c18-4ec7-8d7c-831809c3e86bnvdThird Party Advisory
- xforwoocommerce.com/blog/change-log/xforwoocommerce-1-7-0/nvdVendor Advisory
News mentions
0No linked articles in our index yet.