CVE-2023-28121

CRITICAL EXPLOITED IN THE WILD NUCLEI

Automattic Woocommerce Payments < 4.8.2 - Authentication Bypass

Title source: rule

Description

An issue in WooCommerce Payments plugin for WordPress (versions 5.6.1 and lower) allows an unauthenticated attacker to send requests on behalf of an elevated user, like administrator. This allows a remote, unauthenticated attacker to gain admin access on a site that has the affected version of the plugin activated.

Exploits (9)

nomisec WORKING POC 42 stars
by gbrsh · remote
https://github.com/gbrsh/CVE-2023-28121
nomisec WORKING POC 11 stars
by im-hanzou · client-side
https://github.com/im-hanzou/Mass-CVE-2023-28121
nomisec WORKING POC 1 stars
by rio128128 · client-side
https://github.com/rio128128/Mass-CVE-2023-28121-kdoec
nomisec WORKING POC
by Jenderal92 · poc
https://github.com/Jenderal92/WP-CVE-2023-28121
nomisec SUSPICIOUS
by 0axz-tools · remote
https://github.com/0axz-tools/CVE-2023-28121
nomisec WORKING POC
by sug4r-wr41th · remote
https://github.com/sug4r-wr41th/CVE-2023-28121
nomisec WORKING POC
by 1337nemojj · remote
https://github.com/1337nemojj/CVE-2023-28121
metasploit WORKING POC
by h00die, Michael Mazzolini, Julien Ahrens · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/wp_woocommerce_payments_add_user.rb

Nuclei Templates (1)

WooCommerce Payments - Unauthorized Admin Access
CRITICALVERIFIEDby DhiyaneshDK
Shodan: http.html:/wp-content/plugins/woocommerce-payments
FOFA: body=/wp-content/plugins/woocommerce-payments

Scores

CVSS v3 9.8
EPSS 0.9335
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2023-07-17
InTheWild.io 2023-07-18

Classification

CWE
CWE-287
Status published

Affected Products (5)

automattic/woocommerce_payments < 4.8.2
automattic/woopayments < 5.6.2
automattic/woopayments
automattic/woopayments
automattic/woopayments

Timeline

Published Apr 12, 2023
Tracked Since Feb 18, 2026