Critical Security Flaws Discovered in Popular WordPress Plugins

Security vulnerabilities in popular WordPress plugins continue to pose a significant threat to website owners and their customers. In two recent incidents, security researchers from Wordfence have discovered critical authentication bypass flaws in WordPress plugins – “Abandoned Cart Lite for WooCommerce” and “Booking Calendar | Appointment Booking | BookIt” – that could potentially result in unauthorized access to customer accounts.

Details of the vulnerability in the “Abandoned Cart Lite for WooCommerce” plugin on WordPress

The “Abandoned Cart Lite for WooCommerce” plugin, which is installed on over 30,000 websites, has been found to contain a critical security flaw that affects user accounts. The vulnerability arises due to insufficient encryption protections that are applied to customer notifications when they abandon their shopping carts on e-commerce sites without completing the purchase.

The attacker can exploit the vulnerability to gain access to the accounts of users who have abandoned their carts, as well as other high-level users, when the right conditions are met. The vulnerability has been rated 9.8 out of 10 for severity on the CVSS scoring system, making it a highly critical vulnerability for online retailers.

The vulnerability impacts all versions of the plugin, including and prior to versions 5.14.2. The core of the problem is an authentication bypass case that allows malicious actors to log in as a user with an abandoned cart. Specifically, the encryption key is hard-coded in the plugin, which makes it easier for attackers to exploit the vulnerability.

Wordfence’s security researchers disclosed the vulnerability to the plugin developer, Tyche Softwares, who addressed the issue with an updated plugin version on June 6, 2023. The updated version 5.15.0 fixes the vulnerability by removing the hard-coded encryption key and applying more robust encryption protections to prevent unauthorized access to user accounts. Responsible disclosure ensured that site owners and their customers were made aware of the threat and can take action to protect themselves.

Wordfence discovered an authentication bypass flaw in the “Booking Calendar | Appointment Booking | BookIt” plugin by StylemixThemes

In addition to the Abandoned Cart Lite for WooCommerce plugin, Wordfence also revealed another critical authentication bypass flaw impacting StylemixThemes’ “Booking Calendar | Appointment Booking | BookIt” plugin. The flaw, which affects over 10,000 WordPress installs, has been identified as CVE-2023-2834 with a CVSS score of 9.8.

Details of the flaw show that it affects versions 2.3.7 and earlier. Attackers can exploit this vulnerability to gain unauthorized access to high-level user accounts, thereby giving them access to sensitive data stored on WordPress sites.

Addressing the flaw in the StylemixThemes’ “Booking Calendar | Appointment Booking | BookIt” plugin

StylemixThemes responded to Wordfence’s disclosure of an authentication bypass flaw by releasing an updated version of the plugin on June 13, 2023. The new version, 2.3.8, fixes the vulnerability by removing the authentication bypass and adding more robust security measures.

The discovery of critical authentication bypass flaws in popular WordPress plugins highlights the ongoing need for website owners to update their software and remain vigilant about security threats. Failure to address these vulnerabilities can lead to unauthorized access to customers’ personal data, which can cause significant harm to both the business and the affected individuals.

It is essential to update plugins regularly and ensure that they are developed by reputable vendors who prioritize security. Security researchers play a vital role in identifying and disclosing vulnerabilities responsibly, which allows developers to fix them promptly before they can be exploited by attackers.

In conclusion, website owners must take appropriate steps to protect themselves and their customers by promptly addressing security vulnerabilities on their sites.

Explore more

Are Retailers Ready for the AI Payments They’re Building?

The relentless pursuit of a fully autonomous retail experience has spurred massive investment in advanced payment technologies, yet this innovation is dangerously outpacing the foundational readiness of the very businesses driving it. This analysis explores the growing disconnect between retailers’ aggressive adoption of sophisticated systems, like agentic AI, and their lagging operational, legal, and regulatory preparedness. It addresses the central

Software Can Scale Your Support Team Without New Hires

The sudden and often unpredictable surge in customer inquiries following a product launch or marketing campaign presents a critical challenge for businesses aiming to maintain high standards of service. This operational strain, a primary driver of slow response times and mounting ticket backlogs, can significantly erode customer satisfaction and damage brand loyalty over the long term. For many organizations, the

What’s Fueling Microsoft’s US Data Center Expansion?

Today, we sit down with Dominic Jainy, a distinguished IT professional whose expertise spans the cutting edge of artificial intelligence, machine learning, and blockchain. With Microsoft undertaking one of its most ambitious cloud infrastructure expansions in the United States, we delve into the strategy behind the new data center regions, the drivers for this growth, and what it signals for

What Derailed Oppidan’s Minnesota Data Center Plan?

The development of new data centers often represents a significant economic opportunity for local communities, but the path from a preliminary proposal to a fully operational facility is frequently fraught with complex logistical and regulatory challenges. In a move that highlights these potential obstacles, US real estate developer Oppidan Investment Company has formally retracted its early-stage plans to establish a

Cloud Container Security – Review

The fundamental shift in how modern applications are developed, deployed, and managed can be traced directly to the widespread adoption of cloud container technology, an innovation that promises unprecedented agility and efficiency. Cloud Container technology represents a significant advancement in software development and IT operations. This review will explore the evolution of containers, their key security features, common vulnerabilities, and