Critical severity9.8NVD Advisory· Published Aug 31, 2023· Updated Apr 8, 2026
CVE-2023-3162
CVE-2023-3162
Description
The Stripe Payment Plugin for WooCommerce plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.7.7. This is due to insufficient verification on the user being supplied during a Stripe checkout through the plugin. This allows unauthenticated attackers to log in as users who have orders, who are typically customers.
Affected products
1- cpe:2.3:a:webtoffee:stripe_payment_plugin_for_woocommerce:*:*:*:*:*:wordpress:*:*Range: <=3.7.7
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- plugins.trac.wordpress.org/browser/payment-gateway-stripe-and-woocommerce-integration/tags/3.7.7/includes/class-stripe-checkout.phpnvdPatch
- plugins.trac.wordpress.org/changeset/2925361/payment-gateway-stripe-and-woocommerce-integrationnvdPatch
- www.wordfence.com/threat-intel/vulnerabilities/id/4d052f3e-8554-43f0-a5ae-1de09c198d7bnvdThird Party Advisory
News mentions
0No linked articles in our index yet.