Hundreds of thousands of ecommerce websites could be exposed to attacks due to a critical vulnerability in the WooCommerce Stripe Payment Gateway plugin.
Tracked as CVE-2023-34000, the issue is described as an unauthenticated insecure direct object reference (IDOR) bug leading to information disclosure.
Specifically, the flaw allows an unauthenticated attacker to view any information that a user provides when placing an order, including name, address, and email address.
Due to the lack of order ownership checks, an attacker can exploit the bugs to view order information in the site’s page source or in the front-end, WordPress security company Patchstack, which identified the vulnerability, explains.
According to Patchstack, the handling of order objects is a critical issue in WooCommerce related plugins, as they are often referenced from user input coming from WordPress query_vars. Checking the ownership and order key should help admins assess the access control around order objects.
The issue was resolved on May 30, with the release of WooCommerce Stripe Payment Gateway version 7.4.1.
According to the official WordPress web store, the plugin has more than 900,000 active installations, and hundreds of thousands of them could be vulnerable to attacks based on available version use data.
Developed by WooCommerce, the Stripe Payment Gateway plugin allows ecommerce site owners to take payments directly on their stores, via Stripe’s API, which is available in dozens of countries worldwide.
It supports multiple payment options, including various card types, mobile device payments, and cryptocurrency.