CVE-2024-13652
Description
The ECPay Ecommerce for WooCommerce plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'clear_ecpay_debug_log' AJAX action in all versions up to, and including, 1.1.2411060. This makes it possible for authenticated attackers, with Subscriber-level access and above, to clear the plugin's log files.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The ECPay Ecommerce for WooCommerce plugin lacks a capability check on the AJAX action to clear debug logs, allowing low-privileged users to delete them.
Vulnerability
Description
The ECPay Ecommerce for WooCommerce plugin for WordPress, in all versions up to and including 1.1.2411060, contains a missing capability check vulnerability in the clear_ecpay_debug_log AJAX action [1]. This flaw means that the function responsible for clearing plugin log files does not verify that the requesting user has the necessary administrative privileges before executing the deletion [1].
Exploitation
Prerequisites
An attacker can exploit this vulnerability simply by being an authenticated WordPress user with Subscriber-level access or higher [1]. No other special permissions are needed, and the AJAX action is accessible without a nonce check or additional authorization [1]. The attacker can trigger the action remotely, provided they have a valid session token.
Impact
Successful exploitation allows an authenticated attacker to clear the plugin's debug log files without authorization [1]. While this does not result in data theft or privilege escalation, it can be used to cover an attacker's tracks or hinder forensic analysis of previous malicious activity. The loss of log data may impede incident response and troubleshooting.
Mitigation
The vendor has not yet released a patched version at the time of publication. Site administrators are advised to restrict access to the vulnerable endpoint by applying a web application firewall rule or, if possible, removing the clear_ecpay_debug_log action until an update is provided [1]. Regularly reviewing user roles and limiting Subscriber-level accounts can also reduce risk.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- cpe:2.3:a:ecpay:ecpay_ecommerce_for_woocommerce:*:*:*:*:*:wordpress:*:*Range: <=1.1.2411060
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.