Critical Security Flaws Discovered in Popular WordPress Plugins

Security vulnerabilities in popular WordPress plugins continue to pose a significant threat to website owners and their customers. In two recent incidents, security researchers from Wordfence have discovered critical authentication bypass flaws in WordPress plugins – “Abandoned Cart Lite for WooCommerce” and “Booking Calendar | Appointment Booking | BookIt” – that could potentially result in unauthorized access to customer accounts.

Details of the vulnerability in the “Abandoned Cart Lite for WooCommerce” plugin on WordPress

The “Abandoned Cart Lite for WooCommerce” plugin, which is installed on over 30,000 websites, has been found to contain a critical security flaw that affects user accounts. The vulnerability arises due to insufficient encryption protections that are applied to customer notifications when they abandon their shopping carts on e-commerce sites without completing the purchase.

The attacker can exploit the vulnerability to gain access to the accounts of users who have abandoned their carts, as well as other high-level users, when the right conditions are met. The vulnerability has been rated 9.8 out of 10 for severity on the CVSS scoring system, making it a highly critical vulnerability for online retailers.

The vulnerability impacts all versions of the plugin, including and prior to versions 5.14.2. The core of the problem is an authentication bypass case that allows malicious actors to log in as a user with an abandoned cart. Specifically, the encryption key is hard-coded in the plugin, which makes it easier for attackers to exploit the vulnerability.

Wordfence’s security researchers disclosed the vulnerability to the plugin developer, Tyche Softwares, who addressed the issue with an updated plugin version on June 6, 2023. The updated version 5.15.0 fixes the vulnerability by removing the hard-coded encryption key and applying more robust encryption protections to prevent unauthorized access to user accounts. Responsible disclosure ensured that site owners and their customers were made aware of the threat and can take action to protect themselves.

Wordfence discovered an authentication bypass flaw in the “Booking Calendar | Appointment Booking | BookIt” plugin by StylemixThemes

In addition to the Abandoned Cart Lite for WooCommerce plugin, Wordfence also revealed another critical authentication bypass flaw impacting StylemixThemes’ “Booking Calendar | Appointment Booking | BookIt” plugin. The flaw, which affects over 10,000 WordPress installs, has been identified as CVE-2023-2834 with a CVSS score of 9.8.

Details of the flaw show that it affects versions 2.3.7 and earlier. Attackers can exploit this vulnerability to gain unauthorized access to high-level user accounts, thereby giving them access to sensitive data stored on WordPress sites.

Addressing the flaw in the StylemixThemes’ “Booking Calendar | Appointment Booking | BookIt” plugin

StylemixThemes responded to Wordfence’s disclosure of an authentication bypass flaw by releasing an updated version of the plugin on June 13, 2023. The new version, 2.3.8, fixes the vulnerability by removing the authentication bypass and adding more robust security measures.

The discovery of critical authentication bypass flaws in popular WordPress plugins highlights the ongoing need for website owners to update their software and remain vigilant about security threats. Failure to address these vulnerabilities can lead to unauthorized access to customers’ personal data, which can cause significant harm to both the business and the affected individuals.

It is essential to update plugins regularly and ensure that they are developed by reputable vendors who prioritize security. Security researchers play a vital role in identifying and disclosing vulnerabilities responsibly, which allows developers to fix them promptly before they can be exploited by attackers.

In conclusion, website owners must take appropriate steps to protect themselves and their customers by promptly addressing security vulnerabilities on their sites.

Explore more

Closing the Feedback Gap Helps Retain Top Talent

The silent departure of a high-performing employee often begins months before any formal resignation is submitted, usually triggered by a persistent lack of meaningful dialogue with their immediate supervisor. This communication breakdown represents a critical vulnerability for modern organizations. When talented individuals perceive that their professional growth and daily contributions are being ignored, the psychological contract between the employer and

Employment Design Becomes a Key Competitive Differentiator

The modern professional landscape has transitioned into a state where organizational agility and the intentional design of the employment experience dictate which firms thrive and which ones merely survive. While many corporations spend significant energy on external market fluctuations, the real battle for stability occurs within the structural walls of the office environment. Disruption has shifted from a temporary inconvenience

How Is AI Shifting From Hype to High-Stakes B2B Execution?

The subtle hum of algorithmic processing has replaced the frantic manual labor that once defined the marketing department, signaling a definitive end to the era of digital experimentation. In the current landscape, the novelty of machine learning has matured into a standard operational requirement, moving beyond the speculative buzzwords that dominated previous years. The marketing industry is no longer occupied

Why B2B Marketers Must Focus on the 95 Percent of Non-Buyers

Most executive suites currently operate under the delusion that capturing a lead is synonymous with creating a customer, yet this narrow fixation systematically ignores the vast ocean of potential revenue waiting just beyond the immediate horizon. This obsession with immediate conversion creates a frantic environment where marketing departments burn through budgets to reach the tiny sliver of the market ready

How Will GitProtect on Microsoft Marketplace Secure DevOps?

The modern software development lifecycle has evolved into a delicate architecture where a single compromised repository can effectively paralyze an entire global enterprise overnight. Software engineering is no longer just about writing logic; it involves managing an intricate ecosystem of interconnected cloud services and third-party integrations. As development teams consolidate their operations within these environments, the primary source of truth—the