
Essential flaw in WooCommerce can be utilized to compromise WordPress web sites
WooCommerce, a well-liked plug-in for operating WordPress-based on-line shops, comprises a vital vulnerability that would enable attackers to take over web sites. Technical particulars concerning the vulnerability haven’t been printed but, however the WooCommerce workforce launched updates and attackers might reverse-engineer the patch.
“Though what we all know presently is restricted, what we do know is that the vulnerability permits for unauthenticated administrative takeover of internet sites,” researchers from internet safety agency Sucuri stated in a blog post. “Web site directors utilizing this plugin are suggested to situation the patch as quickly as attainable and examine for any suspicious exercise inside their WordPress web sites equivalent to any administrative actions carried out from unrecognized IP addresses.”
WooCommerce is an open-source e-commerce platform constructed on high of WordPress that is owned and maintained by Automattic, the corporate that is additionally behind WordPress itself. The WooCommerce Payments plug-in, which comprises the vulnerability, at the moment has over 500,000 lively installations.
The WooCommerce builders announced that websites hosted on WordPress.com, Pressable and WPVIP — managed WordPress internet hosting companies — have been mechanically up to date. Nonetheless, all different web sites ought to apply the replace for his or her respective model instantly, if they do not have computerized updates enabled.
The vulnerability impacts all WooCommerce Funds variations since 4.8.0, which was launched on the finish of September. Automattic launched the next patched variations: 4.8.2, 4.9.1, 5.0.4, 5.1.3, 5.2.2, 5.3.1, 5.4.1, 5.5.2 and 5.6.2.
As soon as WooCommerce has been up to date to a patched model, directors ought to examine their web sites for any surprising admin customers or posts. If suspicious exercise is detected, the WooCommerce builders advocate altering the passwords for all admin customers on the positioning, in addition to any API keys for WooCommerce and cost gateways.
“WordPress consumer passwords are hashed utilizing salts, which implies the ensuing hash worth could be very troublesome to crack,” the WooCommerce builders stated. “This salted hash method protects your password as an admin consumer, and likewise the passwords of another customers in your website, together with clients. Whereas it’s attainable the hashed model of your password saved in your database might have been accessed by means of this vulnerability, the hash worth ought to be indiscernible and nonetheless defend your passwords from unauthorized use.”
Nonetheless, it is price noting that this solely applies to passwords hashes saved utilizing the usual WordPress authentication mechanism. Different plug-ins would possibly use credentials, tokens and API keys which might be saved within the database with out hashing. Admins ought to assessment which secrets and techniques they doubtlessly have of their database and rotate all of them.
“You can too take the extra measure of adjusting the salts inside your wp-config.php file if you wish to take further precautions,” the Sucuri researchers stated.
No signal that WooCommerce vulnerability has been exploited
WooCommerce stated it would not imagine this vulnerability was used to compromise retailer or buyer information, however retailers would possibly need to monitor how this incident develops. The vulnerability was reported privately by means of Automattic’s bug bounty program on HackerOne. Whereas the technical particulars haven’t but been disclosed, they may seemingly be in two weeks as per the disclosure coverage.
Nonetheless, the Sucuri researchers already identified that the vulnerability was seemingly in a file referred to as class-platform-checkout-session.php, which appears to have been totally eliminated within the patched model. It is subsequently attainable for expert hackers to determine the vulnerability and the way to exploit it on their very own since they know the place to look.
WordPress web sites have traditionally been a lovely goal for attackers, with many vulnerabilities exploited over time within the platform itself, in addition to in its many third-party plug-ins and themes.
Copyright © 2023 IDG Communications, Inc.