7.5
CVSSv3

CVE-2021-32789

Published: 26/07/2021 Updated: 05/08/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

woocommerce-gutenberg-products-block is a feature plugin for WooCommerce Gutenberg Blocks. An SQL injection vulnerability impacts all WooCommerce sites running the WooCommerce Blocks feature plugin between version 2.5.0 and prior to version 2.5.16. Via a carefully crafted URL, an exploit can be executed against the `wc/store/products/collection-data?calculate_attribute_counts[][taxonomy]` endpoint that allows the execution of a read only sql query. There are patches for many versions of this package, starting with version 2.5.16. There are no known workarounds aside from upgrading.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

automattic woocommerce blocks

Github Repositories

💣 Wordpress WooCommerce users dump exploit

💣 CVE-2021-32789 Wordpress WooCommerce users dump exploit Dump admin user woo -u examplecom Dump all users woo -u examplecom -dump

Authenticated Blind SQL Injection. Wordpress woocommerce plugin versions >= 2.5.0

CVE-2021-32789 Authenticated Blind SQL Injection Wordpress woocommerce plugin versions >= 250 Install git clone githubcom/DonVorrin/CVE-2021-32789git cd CVE-2021-32789 sudo pip install -r requirementstxt Exploit python3 exploitpy Enter URL: (Example: exploitcve/) Enter number: 1 - Output tables