[WordPress Security] PSA: Update Now! Critical Authentication Bypass in WooCommerce Payments Allows Site Takeover

From: Wordfence <list_at_wordfence.com>
Date: Thu, 23 Mar 2023 11:45:12 -0700

Vulnerability allows attackers to impersonate any user and puts as many as 500,000 sites at risk of takeover.

Wordfence-Logo.png (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLqJ3kWDcV1-WJV7CgPCbW2-5VDk4L22hfVQxWM887xXQXW1VNyxR4VLx3DW5zj8Gd8FcLfyW8rskv37062GYVsHW_j66TryKW76vS992mzgwzVK7h741RWrDdW1Qkp-Z4X6PNnW4Gzs4V8yBL8MW1qc6Xl6m52dfW4r2NPp6QYHbWW7FGm799lHHgFW78R3Cz1MdwB7W3BxPMN5bdc_ZW6ZPmcG91tJDz32GH1 )

PSA- Update Now! Critical Authentication Bypass in WooCommerce Payments Allows Site Takeoverv2 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLsN3kWGhV1-WJV7Cg-t1W1Th14S84HsV3W8xc4P23WgQ9wN6yF3vqrq_ndW94QJnn12QGLMN32WmWJWKG96W2XY8Gz9k-JqPW6D8kgq4MylXSW5ftDBM7t8ZFMVvDGRl54tLSYVbZ1wd92DX5MW7W5fK31yCg5CW8sYf2Y5qLf6ZW5cXcp72vJY0bW5kyZKK2kFsHxW6jJVW-9gM6NyN1t07mzKMcZYW1Vcs_s5z35syV6YZqC346RvkW1cMz0G87L3vSW58MT5b6vG1PXW4Z4lMy9d2Nc2W2HlDwP4gPTxrVB5DVm8BjbLnN27yVBWf8-kRW5PpjZC6BySFgW5QcGln360wLzW469f-P7x7733W467kQ46QytjdW1VTzcr2thgTDW3fHzpW9fmcWp37zN1 )

PSA: Update Now! Critical Authentication Bypass in WooCommerce Payments Allows Site Takeover

The Wordfence Threat Intelligence team regularly monitors plugin updates and reviews any indicating that a potential security issue may have been addressed. Today, March 23, 2023, we noticed that the “WooCommerce Payments – Fully Integrated Solution Built and Supported by Woo” plugin updated to version 5.6.2 with a changelog entry marked simply “Security update.”

After reviewing the update we determined that it removed vulnerable code that could allow an unauthenticated attacker to impersonate an administrator and completely take over a website without any user interaction or social engineering required.

We developed a Proof of Concept and began writing and testing a firewall rule immediately. The rule was released the same day, on March 23, 2023 to Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLrh3kWDQV1-WJV7CgGSvN24cgbGnF_vFW3dDCJR94nSC9W6djCbz5M_d1tW7xxHMg2j4LCKW2fJmtt16qMQLW3ycYVR2Pf_jfW1tSWl_8mTTt-W6HnZLW8--mm8W44mJjk6gvgm2W1B039T6z9FP8V6l61j3D0rgmW5Cg_Db61dTrWW8pRxC757Ztp5W6XmCB21bsGrzW3hBVfs1j_TK1W1cc71n3k-XdqV5slNd1qvfStW4zJvwP1bnr1bW4KnS4c5g0BV1Vznbzf8Jv5Np35ns1 ) , Wordfence Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLrh3kWDQV1-WJV7CgCT7W2mJhn77GVp85W5np2hg2BB0vHN6267nCTDgqxW2_FVxs57Fxk0W7Bg1T98ntkbKW1hd5CS1BcvXPW3Y5WvY1q5fQ8W25XxQB1SZtB-W3HGq0p66MbpQW9g90qD9dYXqKW9m2spc827JVXW14dRVt1PXR-gW98Hzpk3-0R1lW5P3DTg4z1gbPW8WQMz93lzrBNW6GZmTL3qNMZXW8hGBTr69dctZW75YN0K5yWq8_W60kZlG2kM7dQVzQ77l7m2FQy3b6B1 ) , and Wordfence Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLrh3kWDQV1-WJV7CgRwHW3FYKbF5RHcGHMrfTd0g-mkFW3l1Vxw4ypgh1W5Gc8FP5l_H9BW3_J91M76RBz2W2D6GtS1q_7NCW24-Nj04mk5_MW8Mrjqj4FYMHzW6-J0d68Nbj4kN64nLdjT1s72W8fnbJ43TlYLgW87sdV_53WmLhVPdwkX34cnHdW52Pk6W3Vlz2FN9fq9qTtGR2NW4y7zVt2QjSkWN5yKjW3xHb9NW3xYQBJ10RJHKW3NNywz7KYdRQW1tfZXn5Nx-7C37JC1 ) customers.

Regardless of the version of Wordfence you are using, we urge you to update to the latest version of the WooCommerce Payments plugin, which is 5.6.2 as of this writing, immediately. WooCommerce Payments is installed on over 500,000 sites, and this is a critical-severity vulnerability.

This email content has also been published on our blog (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLsN3kWGhV1-WJV7Cg-t1W1Th14S84HsV3W8xc4P23WgQ9wN6yF3vqrq_ndW94QJnn12QGLMN32WmWJWKG96W2XY8Gz9k-JqPW6D8kgq4MylXSW5ftDBM7t8ZFMVvDGRl54tLSYVbZ1wd92DX5MW7W5fK31yCg5CW8sYf2Y5qLf6ZW5cXcp72vJY0bW5kyZKK2kFsHxW6jJVW-9gM6NyN1t07mzKMcZYW1Vcs_s5z35syV6YZqC346RvkW1cMz0G87L3vSW58MT5b6vG1PXW4Z4lMy9d2Nc2W2HlDwP4gPTxrVB5DVm8BjbLnN27yVBWf8-kRW5PpjZC6BySFgW5QcGln360wLzW469f-P7x7733W467kQ46QytjdW1VTzcr2thgTDW3fHzpW9fmcWp37zN1 ) and you're welcome to post a comment there if you'd like to join the conversation. Or you can read the full post in this email.

Vulnerability Information

Description: Authentication Bypass and Privilege Escalation (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLs93kWFJV1-WJV7CgHXVW6Gns5-50wDmpTSH8Y38GY-BW3JF8h764KqDTW7HsYdy2j3Y71W68mDRy6lF9mxW3rjq0H64CHvxN8q46Y765wvSW67Pm7B5XSQp1W8-2SC78d3D3NW1T06Jl4RHbRNW6N7BnW50KZBrW47Tvnk97cMknW8fWZs93fM6phW7KVyHW2C-p_QW4_6sQJ3btm5MW9lwkdn6VWJVvW2GhWB74cYHF8N61sx3LQcvKRW8419Fq4y58-WVrRmXv9dYYxjW8LSqhz7QLhbTW42f2vH3t47FHW3C1hjq71m6qpVfQ3S_5Rq_-kW2m-vp_4sfKm7W5Ydm6v8VXgBh3p6s1 )

Affected Plugin: WooCommerce Payments

Plugin Slug: woocommerce-payments

Plugin Developer: Automattic

Affected Versions: <= 5.6.1

CVE ID: N/A

CVSS Score: 9.8 (Critical)

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Fully Patched Version: 5.6.2

The WooCommerce Payments plugin is a fully integrated payment solution for WooCommerce developed by Automattic. Unfortunately it contained functionality designed to integrate with the WooCommerce Payment Platform that allowed unauthenticated attackers to impersonate any user on the site in some contexts, which could then be used to gain full access to a site’s administrator account.

We are withholding additional details at this time to give users time to update.

We do not yet know whether this vulnerability was discovered internally by Automattic or reported by an external researcher, and have not yet determined whether it is actively being exploited in the wild.

We expect to see large-scale attacks targeting this vulnerability once a proof of concept becomes available to attackers.

Conclusion

In today’s PSA we are alerting our user base to a critical-severity vulnerability in WooCommerce Payments, a plugin installed on over 500,000 sites. This vulnerability allows unauthenticated attackers to completely take over a vulnerable site, and we expect to see mass exploitation in the near future. We recommend that all users update to the latest version available, which is 5.6.2 at the time of this writing.

If your site has Wordfence Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLrh3kWDQV1-WJV7CgGSvN24cgbGnF_vFW3dDCJR94nSC9W6djCbz5M_d1tW7xxHMg2j4LCKW2fJmtt16qMQLW3ycYVR2Pf_jfW1tSWl_8mTTt-W6HnZLW8--mm8W44mJjk6gvgm2W1B039T6z9FP8V6l61j3D0rgmW5Cg_Db61dTrWW8pRxC757Ztp5W6XmCB21bsGrzW3hBVfs1j_TK1W1cc71n3k-XdqV5slNd1qvfStW4zJvwP1bnr1bW4KnS4c5g0BV1Vznbzf8Jv5Np35ns1 ) , Wordfence Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLrh3kWDQV1-WJV7CgCT7W2mJhn77GVp85W5np2hg2BB0vHN6267nCTDgqxW2_FVxs57Fxk0W7Bg1T98ntkbKW1hd5CS1BcvXPW3Y5WvY1q5fQ8W25XxQB1SZtB-W3HGq0p66MbpQW9g90qD9dYXqKW9m2spc827JVXW14dRVt1PXR-gW98Hzpk3-0R1lW5P3DTg4z1gbPW8WQMz93lzrBNW6GZmTL3qNMZXW8hGBTr69dctZW75YN0K5yWq8_W60kZlG2kM7dQVzQ77l7m2FQy3b6B1 ) , or Wordfence Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLrh3kWDQV1-WJV7CgRwHW3FYKbF5RHcGHMrfTd0g-mkFW3l1Vxw4ypgh1W5Gc8FP5l_H9BW3_J91M76RBz2W2D6GtS1q_7NCW24-Nj04mk5_MW8Mrjqj4FYMHzW6-J0d68Nbj4kN64nLdjT1s72W8fnbJ43TlYLgW87sdV_53WmLhVPdwkX34cnHdW52Pk6W3Vlz2FN9fq9qTtGR2NW4y7zVt2QjSkWN5yKjW3xHb9NW3xYQBJ10RJHKW3NNywz7KYdRQW1tfZXn5Nx-7C37JC1 ) installed, your site will have received a firewall rule today, March 23, 2023, protecting it against this vulnerability. If your site is running the free version of Wordfence, the rule will become available 30 days from now, on April 22, 2023.

If you know a friend or colleague who is using this plugin on their site, we highly recommend forwarding this advisory to them to help keep their sites protected. Please help make the WordPress community aware of this issue.

If you believe your site has been compromised as a result of this vulnerability or any other vulnerability, we offer Incident Response services via Wordfence Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLrh3kWDQV1-WJV7CgCT7W2mJhn77GVp85W5np2hg2BB0vHN6267nCTDgqxW2_FVxs57Fxk0W7Bg1T98ntkbKW1hd5CS1BcvXPW3Y5WvY1q5fQ8W25XxQB1SZtB-W3HGq0p66MbpQW9g90qD9dYXqKW9m2spc827JVXW14dRVt1PXR-gW98Hzpk3-0R1lW5P3DTg4z1gbPW8WQMz93lzrBNW6GZmTL3qNMZXW8hGBTr69dctZW75YN0K5yWq8_W60kZlG2kM7dQVzQ77l7m2FQy3b6B1 ) . If you need your site cleaned immediately, Wordfence Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLrh3kWDQV1-WJV7CgRwHW3FYKbF5RHcGHMrfTd0g-mkFW3l1Vxw4ypgh1W5Gc8FP5l_H9BW3_J91M76RBz2W2D6GtS1q_7NCW24-Nj04mk5_MW8Mrjqj4FYMHzW6-J0d68Nbj4kN64nLdjT1s72W8fnbJ43TlYLgW87sdV_53WmLhVPdwkX34cnHdW52Pk6W3Vlz2FN9fq9qTtGR2NW4y7zVt2QjSkWN5yKjW3xHb9NW3xYQBJ10RJHKW3NNywz7KYdRQW1tfZXn5Nx-7C37JC1 ) offers the same service with 24/7/365 availability and a 1-hour response time. Both these products include hands-on support in case you need further assistance.

If you are a security researcher, you can responsibly disclose your finds to us and obtain a CVE ID (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLq_3kWDwV1-WJV7CgTVFV_16635RbcVFW7Bg6KR2MkS0YW5pZCf04hbCFCW3n-xRm36qJgDW85x3NW8mtzkyW5PrqHS2qmY-BW7WVxtp11M4c4W96CP-H5h6LZpVgnPz97vWW4PN2xLTrgPdZQQW3jLmY-5R22NjW6j6RJJ5tp250W68kMJb2RJ_0XW22F6R53CyzLhW8y2nDF6Q0GF7N6B4c5bvQxwJN463MGK8vwjsW1ww3vQ8bXPdW31gg1 ) and get your name on the Wordfence Intelligence leaderboard (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLrB3kWF5V1-WJV7CgWxmW69mJBB7Xcr4NW713brL4YkpVWN6nt2PqsdPlmW4-lJjS3qy0Z5W3mdlvn7gWgNCW5fvCTM6dZDLTW8FXgQV4CkfPcW2PMH4Z45y5WfW2xH0Dw64z4s3W4psfvz6DN3RxW48PZ4s7JzK6pN1sv54tX9RlMW4h8DSb2Sn4tMW71VZL17Gv6DGW9hTgjk22dH2VN9l7tD7WqdJzW3ks6sS1J3TZ7W8RCKm37x7x9SW1yjT6F4MbzSGMJwzx_m_TZ2W7FvYkL6lShmDW130YqC2wFpgp35Qj1 ) .

The Full Product Lineup:

wf-stacked-free-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLrh3kWDQV1-WJV7CgVVPW8TWxMZ14L_f2VVwqWR854v4kW50vZc62mZC4yW4BRszv4y0nDCW3Kq8mn17Drx6VSVV766Xb2FdVb1X6-3bCccbW8vztPs1Nc4_TW5DZY3R781T_yN4wdBW3Pr2P5W9cPwHc3DhtBkVD8n8Q3rRkfCVbLgfR21bZWVW7xhYTb8HhHY9W4K-jcK53K_rYVsR8qw49PbnYVGy0y74D49j1W4pNMkx7GdjW2Vpmr6b5SvYMFW2dJTc29jm2Yw33Tl1 )

wf-stacked-premium-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLrh3kWDQV1-WJV7CgTPZW36l6_27C80DXW1PQpSd8PzyJSVV2s6b3WWKmhW85lK_K4fNs8kW5VsLpm6SzsTLVZnvjk3XK_N8W3ZKm1x7M6hgFW1nK8mM4CbSydN7WDLWHYn3s9W9fB5gG1CJ54mN31HlMWgZ-GqMzdMpjqFByDW7vkGYr83pmSsN2MS7tB5r8vdW8Tt7dm8Y6jPsV-JpWC8Dw0DtW2qjQyz11sXChW56KZFD1l6FQsW8dML-67lCZfzW2wC9B41vQfXJ32Wn1 )

wf-stacked-care-3 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLrh3kWDQV1-WJV7CgN4VW20Xdjt2lc_ZNW2L3lxL7kdbZ8W4Hx9fs49DnW6VXXk9q25DS4wW6GzPvy6-vFmgW57bxQg4r2nK3W6W2D_b2HXR_cW970TbZ6NDTkSW34FjjK67TF2FW3kVlkP5JbkfKW2zdqDX5xdfLBN2v4tW9CBpmmW22W1642svNHxW4sCsjM3dtxCvW9ctXr41V2CTfW6M2bh4449jHRW1327R12G0N1lN1CSb8Tsyy2WN7-J_4xYCmT1W1m3qvP5xRq2Q3hfp1 )

wf-stacked-response-2 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLrh3kWDQV1-WJV7CgRwHW3FYKbF5RHcGHMrfTd0g-mkFW3l1Vxw4ypgh1W5Gc8FP5l_H9BW3_J91M76RBz2W2D6GtS1q_7NCW24-Nj04mk5_MW8Mrjqj4FYMHzW6-J0d68Nbj4kN64nLdjT1s72W8fnbJ43TlYLgW87sdV_53WmLhVPdwkX34cnHdW52Pk6W3Vlz2FN9fq9qTtGR2NW4y7zVt2QjSkWN5yKjW3xHb9NW3xYQBJ10RJHKW3NNywz7KYdRQW1tfZXn5Nx-7C37JC1 )

wf-logo-intelligence-h-800 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLq_3kWDwV1-WJV7CgSZTW5HFKRz2sqYWZW1vvnBJ3G6cywVwVvdx3NnyH5W4h7LQ219ZGMfW5fWYHS6kq8ScW4T6YCT8nNfNwW5P1xNV8ZC2jSW3KgFz15p7KNxW8G1Qv764d2ZCW2ldJQF6JtWc6W1ryKyX2sCVH2W93DL6h5Jh8TLV7_Hqs70JpnhVn4Dvk6mW1FpN8blBPbCY7vlW29kfrH1C4LwdW15zcJq4mqVh3W1RWt752SKWpN37wW1 )

logo-defiant (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVDNKY5YDB0pW62TQMH5GxrCrW5SJqyG4YvjZdN1qZLqJ3kWDcV1-WJV7CgRM_W3NB4sG1r0DmmW5pmrKt1YKSRVW2WTzgH8lSB8wW4hxQDp5W2W0lW21DGlf17bBKhN4XWZjkQn-hqW7RTb17616llyW5Jw72L2JXk_PW1QXH5y7CB2LtW61xNh912LVB-W8Fr3M55pkTYrW6FkG0H8CfK19W6lY6Yv2XBP_dW8CFR-68j8WB1W6CG-Gy2VWkYFW3yQ7Qt2YN1ZS3hcw1 )

Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States

Unsubscribe (https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcM-W4-183m5pzg0XV25tFc9h6-dxW7DCDS666ZJDRN8NX7bt1yf0NW31gJYc1qMtBbW2LlYjc8zjVsgn8jPjqs4x3&v=3&_hsenc=p2ANqtz-8ufNPxDgx-mlgAw_duCR11Ix_mdDMUPQ8kSHGPq9XZCvr6xiB4E_jlGOYJkDXLYDXOfULHLV0iOet36ZyTE0_VeQQJ_A&_hsmi=251503445 )

Manage preferences (https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcM-W4-183m5pzg0XV25tFc9h6-dxW7DCDS666ZJDRN8NX7bt1yf0NW31gJYc1qMtBbW2LlYjc8zjVsgn8jPjqs4x3&v=3&_hsenc=p2ANqtz-8ufNPxDgx-mlgAw_duCR11Ix_mdDMUPQ8kSHGPq9XZCvr6xiB4E_jlGOYJkDXLYDXOfULHLV0iOet36ZyTE0_VeQQJ_A&_hsmi=251503445 )

You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Thu Mar 23 2023 - 19:45:15 CET

This archive was generated by hypermail 2.3.0 : Thu Mar 23 2023 - 19:52:31 CET