WordPress Stripe Payment Gateway Plugin Leaves Nearly 900,000 Installations Worldwide Vulnerable to IDOR Attack

WordPress is one of the most popular website builders that provides individuals and businesses with a platform for creating their own websites. The platform offers various themes, plugins, and features that can be added to a website to enhance its functionality and design. One such plugin is the WooCommerce Stripe Gateway Plugin, which allows users to keep customers on their WordPress site during payment. Unfortunately, this plugin has a vulnerability that exposes nearly 900,000 installations worldwide to an unauthenticated insecure direct object reference (IDOR) attack.

Vulnerability Description: Unauthenticated Insecure Direct Object Reference (IDOR) in WordPress Stripe Payment Gateway Plugin

Insecure Direct Object Reference (IDOR) is a security flaw in an application that occurs when the application exposes a reference to an internal object in such a way that attackers can manipulate the object. In the case of the WordPress Stripe Payment Gateway Plugin, a vulnerability was discovered that allows an attacker to retrieve sensitive information from the database without proper authentication.

Plugin Information: Version 7.4.1 and 900K Installations Worldwide

The WordPress Stripe Payment Gateway Plugin is a popular plugin used by nearly 900,000 installations worldwide. The plugin version that is vulnerable to the IDOR attack is 7.4.0 and below. It is essential to note that the vulnerability was discovered in version 7.4.0 and is not present in higher versions of the plugin.

The purpose of using the WooCommerce Stripe Gateway Plugin is to keep customers on the WordPress site during the payment process. This is achieved by providing a secure payment gateway that prevents customers from being redirected to third-party sites, offering a seamless and effortless shopping experience.

Exploitation Method: Retrieving Sensitive Information from Database using javascript_params and payment_fields function

The vulnerability in the WooCommerce Stripe Gateway Plugin is caused by a flaw in the javascript_params and payment_fields function. An attacker can exploit these functions to retrieve sensitive information from the database. Since this vulnerability can be exploited without authentication, it poses a severe risk.

Severity Level: Exposure of Sensitive Data is Considered Serious and may Lead to More Attacks

Exposure of the above data is considered serious. Once sensitive information, such as credit card numbers, is retrieved by an attacker, it can be used to conduct fraudulent activities and compromise the security of online transactions. The vulnerability can lead to more attacks if not addressed promptly.

Affected Product: WordPress Stripe Gateway Plugin Version 7.4.0 and Below

The vulnerability exists in the WordPress Stripe Gateway Plugin version 7.4.0 and below. Hence, users who have installed this version or below are at risk of being compromised.

Solution available

Fixed in Version 7.4.1. The necessary updates to address this flaw have been made available by WooCommerce. The vulnerability has been fixed in version 7.4.1. Users are advised to upgrade to version 7.4.1, which addresses this flaw.

WordPress has responded to the vulnerability by releasing version 7.4.1, which fixes the flaw. The company has also advised users to upgrade to the latest version to ensure the security of their online transactions.

Statistics

More than half of all active plugin installations use a vulnerable version, according to statistics compiled by WordPress.org. This indicates that the majority of users are at risk and must update their plugin immediately.

To conclude, the WordPress Stripe Gateway Plugin has a vulnerability that exposes nearly 900K installations worldwide to an Unauthenticated Insecure Direct Object Reference (IDOR) attack. The flaw exists in version 7.4.0 and below. It is recommended that users upgrade to version 7.4.1 to address this issue. Failure to update the plugin exposes users to the risk of sensitive information being accessed by an attacker, leading to fraudulent activities and compromise of online transactions. Keeping your WordPress plugins up-to-date is essential to ensuring the security of your website and preventing vulnerabilities from being exploited.

Explore more

How Does Martech Orchestration Align Customer Journeys?

A consumer who completes a high-value transaction only to be bombarded by discount advertisements for that exact same item moments later experiences the digital equivalent of a salesperson following them out of a store and shouting through a megaphone. This friction point is not merely a minor annoyance for the user; it is a glaring indicator of a systemic failure

AMD Launches Ryzen PRO 9000 Series for AI Workstations

Modern high-performance computing has reached a definitive turning point where raw clock speeds alone no longer satisfy the insatiable hunger of local machine learning models. This roundup explores how the Zen 5 architecture addresses the shift from general productivity to AI-centric workstation requirements. By repositioning the Ryzen PRO brand, the industry is witnessing a focused effort to eliminate the data

Will the Radeon RX 9050 Redefine Mid-Range Efficiency?

The pursuit of graphical fidelity has often come at the expense of power consumption, yet the upcoming release of the Radeon RX 9050 suggests a calculated shift toward energy efficiency in the mainstream market. Leaked specifications from an anonymous board partner indicate that this new entry-level or mid-range card utilizes the Navi 44 GPU architecture, a cornerstone of the RDNA

Can the AMD Instinct MI350P Unlock Enterprise AI Scaling?

The relentless surge of agentic artificial intelligence has forced modern corporations to confront a harsh reality: the traditional cloud-centric computing model is rapidly becoming an unsustainable drain on capital and operational flexibility. Many enterprises today find themselves trapped in a costly paradox where scaling their internal AI capabilities threatens to erase the very profit margins those technologies were intended to

How Does OpenAI Symphony Scale AI Engineering Teams?

Scaling a software team once meant navigating a sea of resumes and conducting endless technical interviews, but the emergence of automated orchestration has redefined the very nature of human-led productivity. The traditional model of human-AI collaboration hit a hard limit where a single engineer could typically only supervise three to five concurrent AI sessions before the cognitive load of context