WordPress Stripe Payment Gateway Plugin Leaves Nearly 900,000 Installations Worldwide Vulnerable to IDOR Attack

WordPress is one of the most popular website builders that provides individuals and businesses with a platform for creating their own websites. The platform offers various themes, plugins, and features that can be added to a website to enhance its functionality and design. One such plugin is the WooCommerce Stripe Gateway Plugin, which allows users to keep customers on their WordPress site during payment. Unfortunately, this plugin has a vulnerability that exposes nearly 900,000 installations worldwide to an unauthenticated insecure direct object reference (IDOR) attack.

Vulnerability Description: Unauthenticated Insecure Direct Object Reference (IDOR) in WordPress Stripe Payment Gateway Plugin

Insecure Direct Object Reference (IDOR) is a security flaw in an application that occurs when the application exposes a reference to an internal object in such a way that attackers can manipulate the object. In the case of the WordPress Stripe Payment Gateway Plugin, a vulnerability was discovered that allows an attacker to retrieve sensitive information from the database without proper authentication.

Plugin Information: Version 7.4.1 and 900K Installations Worldwide

The WordPress Stripe Payment Gateway Plugin is a popular plugin used by nearly 900,000 installations worldwide. The plugin version that is vulnerable to the IDOR attack is 7.4.0 and below. It is essential to note that the vulnerability was discovered in version 7.4.0 and is not present in higher versions of the plugin.

The purpose of using the WooCommerce Stripe Gateway Plugin is to keep customers on the WordPress site during the payment process. This is achieved by providing a secure payment gateway that prevents customers from being redirected to third-party sites, offering a seamless and effortless shopping experience.

Exploitation Method: Retrieving Sensitive Information from Database using javascript_params and payment_fields function

The vulnerability in the WooCommerce Stripe Gateway Plugin is caused by a flaw in the javascript_params and payment_fields function. An attacker can exploit these functions to retrieve sensitive information from the database. Since this vulnerability can be exploited without authentication, it poses a severe risk.

Severity Level: Exposure of Sensitive Data is Considered Serious and may Lead to More Attacks

Exposure of the above data is considered serious. Once sensitive information, such as credit card numbers, is retrieved by an attacker, it can be used to conduct fraudulent activities and compromise the security of online transactions. The vulnerability can lead to more attacks if not addressed promptly.

Affected Product: WordPress Stripe Gateway Plugin Version 7.4.0 and Below

The vulnerability exists in the WordPress Stripe Gateway Plugin version 7.4.0 and below. Hence, users who have installed this version or below are at risk of being compromised.

Solution available

Fixed in Version 7.4.1. The necessary updates to address this flaw have been made available by WooCommerce. The vulnerability has been fixed in version 7.4.1. Users are advised to upgrade to version 7.4.1, which addresses this flaw.

WordPress has responded to the vulnerability by releasing version 7.4.1, which fixes the flaw. The company has also advised users to upgrade to the latest version to ensure the security of their online transactions.

Statistics

More than half of all active plugin installations use a vulnerable version, according to statistics compiled by WordPress.org. This indicates that the majority of users are at risk and must update their plugin immediately.

To conclude, the WordPress Stripe Gateway Plugin has a vulnerability that exposes nearly 900K installations worldwide to an Unauthenticated Insecure Direct Object Reference (IDOR) attack. The flaw exists in version 7.4.0 and below. It is recommended that users upgrade to version 7.4.1 to address this issue. Failure to update the plugin exposes users to the risk of sensitive information being accessed by an attacker, leading to fraudulent activities and compromise of online transactions. Keeping your WordPress plugins up-to-date is essential to ensuring the security of your website and preventing vulnerabilities from being exploited.

Explore more

How Can AI Give Your Business a Competitive Edge?

A seasoned entrepreneur recently discovered the devastating reality of a hyper-competitive market when a missed connection at seven o’clock on a Tuesday evening resulted in the immediate loss of a four thousand dollar contract. The prospect reached out twice, received no answer from the office, and moved on to sign with a competitor by the following morning. This scenario illustrates

Why Is Customer Satisfaction No Longer Enough?

The deceptive tranquility of a high customer satisfaction score often masks a structural vulnerability where consumers remain perfectly content while simultaneously preparing to migrate to a more innovative competitor. A customer walks out of a store or closes a digital browser tab having received exactly what the individual paid for, yet the person feels no particular urge to return or

PayPal Merges Crypto and Payments into Unified Division

The invisible barrier that once separated the volatile world of digital tokens from the steady pulse of everyday commerce has finally been dismantled by a financial giant. For years, fintech users have navigated a clunky divide where one side of an application was reserved for “real” money and another entirely different section housed digital assets. That boundary officially dissolved on

How Will Unified Standards Shape the Digital Euro?

The seamless act of purchasing a morning espresso should be as effortless in Lisbon as it is in Helsinki, yet the current technological reality reveals a disjointed patchwork of national payment systems. While physical borders have largely vanished within the euro area, the digital payment landscape remains fragmented, relying on a complex web of local schemes and international proprietary giants.

Harness Launches Cursor Integration to Streamline AI DevOps

The relentless friction of toggling between complex code editors and sprawling deployment dashboards has long served as a silent tax on the cognitive bandwidth of even the most efficient software engineering teams. This fragmentation often stifles creative flow during critical production cycles. By embedding automated delivery directly into the workspace, the industry is making the last mile of software as