Skip to main content

CVE-2021-34646: CWE-290 Authentication Bypass by Spoofing in Pluggabl LLC Booster for WooCommcerce

Critical
VulnerabilityCVE-2021-34646cvecve-2021-34646cwe-290
Published: Mon Aug 30 2021 (08/30/2021, 18:03:51 UTC)
Source: CVE
Vendor/Project: Pluggabl LLC
Product: Booster for WooCommcerce

Description

Versions up to, and including, 5.4.3, of the Booster for WooCommerce WordPress plugin are vulnerable to authentication bypass via the process_email_verification function due to a random token generation weakness in the reset_and_mail_activation_link function found in the ~/includes/class-wcj-emails-verification.php file. This allows attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Email Verification module to be active in the plugin and the Login User After Successful Verification setting to be enabled, which it is by default.

AI-Powered Analysis

AILast updated: 07/05/2025, 22:11:17 UTC

Technical Analysis

CVE-2021-34646 is a critical authentication bypass vulnerability affecting the Booster for WooCommerce WordPress plugin developed by Pluggabl LLC, specifically versions up to and including 5.4.3. The vulnerability arises from a weakness in the random token generation mechanism within the reset_and_mail_activation_link function located in the ~/includes/class-wcj-emails-verification.php file. This flaw impacts the Email Verification module of the plugin, which when active, allows attackers to exploit the process_email_verification function to bypass authentication controls. The vulnerability enables an attacker to impersonate arbitrary users, including administrators, by triggering an email address verification process that automatically logs the attacker in as the targeted user. This attack vector requires the Email Verification module to be enabled and the 'Login User After Successful Verification' setting to be active, which is the default configuration. The vulnerability is classified under CWE-290 (Authentication Bypass by Spoofing) and has a CVSS v3.1 base score of 9.8, indicating a critical severity level. The exploit requires no privileges, no user interaction, and can be executed remotely over the network, making it highly exploitable. Although no known exploits in the wild have been reported, the potential impact on confidentiality, integrity, and availability is severe, as attackers can gain unauthorized administrative access to affected WordPress sites running this plugin version. This could lead to full site compromise, data theft, defacement, or further malware deployment.

Potential Impact

For European organizations, the impact of this vulnerability is significant, especially for those relying on WooCommerce for e-commerce operations. Successful exploitation can lead to unauthorized administrative access, allowing attackers to manipulate product listings, customer data, and transaction records, potentially resulting in financial losses and reputational damage. Confidential customer information, including personal and payment data, could be exposed, violating GDPR and other data protection regulations, leading to legal penalties. The integrity of the e-commerce platform could be compromised, affecting business continuity and customer trust. Additionally, attackers could use compromised sites as a foothold for lateral movement within corporate networks or to distribute malware to customers. Given the widespread use of WooCommerce across European small and medium enterprises (SMEs), this vulnerability poses a broad risk to the e-commerce sector.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the Booster for WooCommerce plugin to a version where this issue is patched; if an official patch is not yet available, consider temporarily disabling the Email Verification module or the 'Login User After Successful Verification' setting to prevent exploitation. Implement strict monitoring of authentication logs and unusual login activities to detect potential exploitation attempts. Employ web application firewalls (WAFs) with custom rules to block suspicious requests targeting the vulnerable functions. Conduct regular security audits of WordPress plugins and maintain an inventory to ensure timely updates. Additionally, enforce multi-factor authentication (MFA) for administrative accounts to reduce the risk of unauthorized access even if the vulnerability is exploited. Backup site data frequently and ensure backups are stored securely to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2021-06-10T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc984

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/5/2025, 10:11:17 PM

Last updated: 7/30/2025, 2:18:54 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats