Critical Security Flaws Discovered in Popular WordPress Plugins

Security vulnerabilities in popular WordPress plugins continue to pose a significant threat to website owners and their customers. In two recent incidents, security researchers from Wordfence have discovered critical authentication bypass flaws in WordPress plugins – “Abandoned Cart Lite for WooCommerce” and “Booking Calendar | Appointment Booking | BookIt” – that could potentially result in unauthorized access to customer accounts.

Details of the vulnerability in the “Abandoned Cart Lite for WooCommerce” plugin on WordPress

The “Abandoned Cart Lite for WooCommerce” plugin, which is installed on over 30,000 websites, has been found to contain a critical security flaw that affects user accounts. The vulnerability arises due to insufficient encryption protections that are applied to customer notifications when they abandon their shopping carts on e-commerce sites without completing the purchase.

The attacker can exploit the vulnerability to gain access to the accounts of users who have abandoned their carts, as well as other high-level users, when the right conditions are met. The vulnerability has been rated 9.8 out of 10 for severity on the CVSS scoring system, making it a highly critical vulnerability for online retailers.

The vulnerability impacts all versions of the plugin, including and prior to versions 5.14.2. The core of the problem is an authentication bypass case that allows malicious actors to log in as a user with an abandoned cart. Specifically, the encryption key is hard-coded in the plugin, which makes it easier for attackers to exploit the vulnerability.

Wordfence’s security researchers disclosed the vulnerability to the plugin developer, Tyche Softwares, who addressed the issue with an updated plugin version on June 6, 2023. The updated version 5.15.0 fixes the vulnerability by removing the hard-coded encryption key and applying more robust encryption protections to prevent unauthorized access to user accounts. Responsible disclosure ensured that site owners and their customers were made aware of the threat and can take action to protect themselves.

Wordfence discovered an authentication bypass flaw in the “Booking Calendar | Appointment Booking | BookIt” plugin by StylemixThemes

In addition to the Abandoned Cart Lite for WooCommerce plugin, Wordfence also revealed another critical authentication bypass flaw impacting StylemixThemes’ “Booking Calendar | Appointment Booking | BookIt” plugin. The flaw, which affects over 10,000 WordPress installs, has been identified as CVE-2023-2834 with a CVSS score of 9.8.

Details of the flaw show that it affects versions 2.3.7 and earlier. Attackers can exploit this vulnerability to gain unauthorized access to high-level user accounts, thereby giving them access to sensitive data stored on WordPress sites.

Addressing the flaw in the StylemixThemes’ “Booking Calendar | Appointment Booking | BookIt” plugin

StylemixThemes responded to Wordfence’s disclosure of an authentication bypass flaw by releasing an updated version of the plugin on June 13, 2023. The new version, 2.3.8, fixes the vulnerability by removing the authentication bypass and adding more robust security measures.

The discovery of critical authentication bypass flaws in popular WordPress plugins highlights the ongoing need for website owners to update their software and remain vigilant about security threats. Failure to address these vulnerabilities can lead to unauthorized access to customers’ personal data, which can cause significant harm to both the business and the affected individuals.

It is essential to update plugins regularly and ensure that they are developed by reputable vendors who prioritize security. Security researchers play a vital role in identifying and disclosing vulnerabilities responsibly, which allows developers to fix them promptly before they can be exploited by attackers.

In conclusion, website owners must take appropriate steps to protect themselves and their customers by promptly addressing security vulnerabilities on their sites.

Explore more

Can You Spot a Deepfake During a Job Interview?

The Ghost in the Machine: When Your Top Candidate Is a Digital Mask The screen displays a perfectly polished professional who answers every complex technical question with surgical precision, yet a subtle, unnatural flicker near the jawline suggests something is deeply wrong. This unsettling scenario became reality at Pindrop Security during an interview with a candidate named “Ivan,” whose digital

Data Science vs. Artificial Intelligence: Choosing Your Path

The modern job market operates within a high-stakes environment where digital transformation has accelerated to a point that leaves even seasoned professionals questioning their specialized trajectory. Job boards are currently flooded with titles that seem to shift shape by the hour, creating a confusing landscape for those entering the technology sector. One listing calls for a data scientist with deep

How AI Is Transforming Global Hiring for HR Professionals?

The landscape of international recruitment has undergone a staggering metamorphosis that effectively erased the traditional borders once separating regional labor markets from the global economy. Half a decade ago, establishing a presence in a foreign market required exhaustive legal frameworks, exorbitant capital investment, and months of administrative negotiations. Today, the operational reality is entirely different; even nascent organizations can engage

Who Is Winning the Agentic AI Race in DevOps?

The relentless pressure to deliver software at breakneck speeds has pushed traditional CI/CD pipelines to a breaking point where manual intervention is no longer a sustainable strategy for modern engineering teams. As organizations navigate the complexities of distributed cloud systems, the transition from rigid automation to fluid, autonomous operations has become the defining challenge for the current technological landscape. This

How Email Verification Protects Your Sender Reputation?

Maintaining a flawless digital communication channel requires more than just compelling copy; it demands a rigorous defense against the invisible erosion of subscriber data that threatens every modern marketing department. Verification acts as a critical shield for the digital infrastructure of an organization, ensuring that marketing efforts actually reach the intended recipients instead of vanishing into the ether. This process