356
VMScore

CVE-2021-32790

Published: 26/07/2021 Updated: 04/08/2021
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 4.9 | Impact Score: 3.6 | Exploitability Score: 1.2
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

Woocommerce is an open source eCommerce plugin for WordPress. An SQL injection vulnerability impacts all WooCommerce sites running the WooCommerce plugin between version 3.3.0 and 3.3.6. Malicious actors (already) having admin access, or API keys to the WooCommerce site can exploit vulnerable endpoints of `/wp-json/wc/v3/webhooks`, `/wp-json/wc/v2/webhooks` and other webhook listing API. Read-only SQL queries can be executed using this exploit, while data will not be returned, by carefully crafting `search` parameter information can be disclosed using timing and related attacks. Version 3.3.6 is the earliest version of Woocommerce with a patch for this vulnerability. There are no known workarounds other than upgrading.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

woocommerce woocommerce

Github Repositories

CVE-2021-32790 This is a Proof of Concept for the WooCommerce 33-55 Blind Time based SQL Injection written quickly in python3 In my case it was Unauthenticated but if yours require authentication, make sure to add the cookies in the script and it should still work When adding the URL as an argument, you will see the response time Default script has a sleep of 5 seconds Fe