CVE-2023-28121

An issue in WooCommerce Payments plugin for WordPress (versions 5.6.1 and lower) allows an unauthenticated attacker to send requests on behalf of...

Basic Information

CVE State
PUBLISHED
Reserved Date
March 10, 2023
Published Date
April 12, 2023
Last Updated
August 02, 2024
Vendor
n/a
Product
WooCommerce Payments WordPress Plugin
Description
An issue in WooCommerce Payments plugin for WordPress (versions 5.6.1 and lower) allows an unauthenticated attacker to send requests on behalf of an elevated user, like administrator. This allows a remote, unauthenticated attacker to gain admin access on a site that has the affected version of the plugin activated.
Tags
wordpress nuclei_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

Score
93.46% (Percentile: 99.81%) as of 2025-05-12

Exploit Status

Exploited in the Wild
Yes (2023-07-17 10:27:14 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
Wordfence 2023-07-17 10:27:14 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

Jenderal92/WP-CVE-2023-28121

Type: github • Created: 2023-11-03 01:19:09 UTC • Stars: 1

Wordpress CVE-2023-28121

im-hanzou/Mass-CVE-2023-28121

Type: github • Created: 2023-07-12 02:41:26 UTC • Stars: 11

CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]

gbrsh/CVE-2023-28121

Type: github • Created: 2023-03-30 23:50:39 UTC • Stars: 38

WooCommerce Payments: Unauthorized Admin Access Exploit

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Added to KEVIntel

  • Detected by Nuclei