cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forwoocommerce-mercadopago woocommerce-mercadopago

Direction: descending
Jul 21, 2024

Mercado Pago payments for WooCommerce # CVE-2024-3934

CVE, Research URL

CVE-2024-3934

Date
Jul 20, 2024
Research Description
The Mercado Pago payments for WooCommerce plugin for WordPress is vulnerable to Path Traversal in versions 7.3.0 to 7.5.1 via the mercadopagoDownloadLog function. This makes it possible for authenticated attackers, with subscriber-level access and above, to download and read the contents of arbitrary files on the server, which can contain sensitive information. The arbitrary file download was patched in 7.5.1, while the missing authorization was corrected in version 7.6.2.
Affected versions
max 7.6.2.
Status
vulnerable
Jun 07, 2024

Mercado Pago payments for WooCommerce # CVE-2022-45068

CVE, Research URL

CVE-2022-45068

Date
Mar 01, 2023
Research Description
Cross-Site Request Forgery (CSRF) vulnerability in Mercado Pago Mercado Pago payments for WooCommerce plugin <= 6.3.1.
Affected versions
max 6.4.0.
Status
vulnerable

Mercado Pago payments for WooCommerce # 41b175013b292edd03143070e2e9a0f6ba91a9e0

Date
Jan 23, 2023
Research Description
Mercado Pago payments for WooCommerce [woocommerce-mercadopago] < 6.7.0 Mercado Pago payments for WooCommerce <= 6.6.0 - Cross-Site Request Forgery The Mercado Pago payments for WooCommerce plugin is vulnerable to Cross-Site Request Forgery in versions up to, and including, 6.6.0. This is due to missing or incorrect nonce validation on the 'process_payment' function. This makes it possible for unauthenticated attackers to trick other users or visitors into checking out via a forged request.
Affected versions
max 6.7.0.
Status
vulnerable