Hundreds of thousands of ecommerce websites could be exposed to attacks due to a critical vulnerability in the WooCommerce Stripe Payment Gateway plugin.
Tracked as CVE-2023-34000, the issue is described as an unauthenticated insecure direct object reference (IDOR) bug leading to information disclosure.
Specifically, the flaw allows an unauthenticated attacker to view any information that a user provides when placing an order, including name, address, and email address.
The security defect exists because the ‘javascript_params’ and ‘payment_fields’ functions lack proper access control and handle data in an insecure manner.
Due to the lack of order ownership checks, an attacker can exploit the bugs to view order information in the site’s page source or in the front-end, WordPress security company Patchstack, which identified the vulnerability, explains.
According to Patchstack, the handling of order objects is a critical issue in WooCommerce related plugins, as they are often referenced from user input coming from WordPress query_vars. Checking the ownership and order key should help admins assess the access control around order objects.
The issue was resolved on May 30, with the release of WooCommerce Stripe Payment Gateway version 7.4.1.
According to the official WordPress web store, the plugin has more than 900,000 active installations, and hundreds of thousands of them could be vulnerable to attacks based on available version use data.
Developed by WooCommerce, the Stripe Payment Gateway plugin allows ecommerce site owners to take payments directly on their stores, via Stripe’s API, which is available in dozens of countries worldwide.
It supports multiple payment options, including various card types, mobile device payments, and cryptocurrency.
Related: Millions of WordPress Sites Patched Against Critical Jetpack Vulnerability
Related: WordPress Field Builder Plugin Vulnerability Exploited in Attacks Two Days After Patch
Related: 1 Million WordPress Sites Impacted by Exploited Plugin Vulnerability

More from Ionut Arghire
- Generative AI Startup Nexusflow Raises $10.6 Million
- Researchers Extract Sounds From Still Images on Smartphone Cameras
- Hackers Set Sights on Apache NiFi Flaw That Exposes Many Organizations to Attacks
- Cloudflare Users Exposed to Attacks Launched From Within Cloudflare: Researchers
- FBI Warns Organizations of Dual Ransomware, Wiper Attacks
- Lumu Raises $30 Million for Threat Detection and Response Platform
- Cisco Warns of IOS Software Zero-Day Exploitation Attempts
- Russian Zero-Day Acquisition Firm Offers $20 Million for Android, iOS Exploits
Latest News
- Bankrupt IronNet Shuts Down Operations
- AWS Using MadPot Decoy System to Disrupt APTs, Botnets
- Generative AI Startup Nexusflow Raises $10.6 Million
- In Other News: RSA Encryption Attack, Meta AI Privacy, ShinyHunters Hacker Guilty Plea
- Researchers Extract Sounds From Still Images on Smartphone Cameras
- National Security Agency is Starting an Artificial Intelligence Security Center
- CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
- Hackers Set Sights on Apache NiFi Flaw That Exposes Many Organizations to Attacks
