CVE-2023-28121
CRITICAL EXPLOITED IN THE WILD NUCLEIAutomattic Woocommerce Payments < 4.8.2 - Authentication Bypass
Title source: ruleDescription
An issue in WooCommerce Payments plugin for WordPress (versions 5.6.1 and lower) allows an unauthenticated attacker to send requests on behalf of an elevated user, like administrator. This allows a remote, unauthenticated attacker to gain admin access on a site that has the affected version of the plugin activated.
Exploits (9)
nomisec
WORKING POC
11 stars
by im-hanzou · client-side
https://github.com/im-hanzou/Mass-CVE-2023-28121
nomisec
WORKING POC
1 stars
by rio128128 · client-side
https://github.com/rio128128/Mass-CVE-2023-28121-kdoec
metasploit
WORKING POC
by h00die, Michael Mazzolini, Julien Ahrens · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/wp_woocommerce_payments_add_user.rb
Nuclei Templates (1)
WooCommerce Payments - Unauthorized Admin Access
CRITICALVERIFIEDby DhiyaneshDK
Shodan:
http.html:/wp-content/plugins/woocommerce-payments
FOFA:
body=/wp-content/plugins/woocommerce-payments
Scores
CVSS v3
9.8
EPSS
0.9335
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2023-07-17
InTheWild.io
2023-07-18
Classification
CWE
CWE-287
Status
published
Affected Products (5)
automattic/woocommerce_payments
< 4.8.2
automattic/woopayments
< 5.6.2
automattic/woopayments
automattic/woopayments
automattic/woopayments
Timeline
Published
Apr 12, 2023
Tracked Since
Feb 18, 2026