CVE-2021-34646: CWE-290 Authentication Bypass by Spoofing in Pluggabl LLC Booster for WooCommcerce
Versions up to, and including, 5.4.3, of the Booster for WooCommerce WordPress plugin are vulnerable to authentication bypass via the process_email_verification function due to a random token generation weakness in the reset_and_mail_activation_link function found in the ~/includes/class-wcj-emails-verification.php file. This allows attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Email Verification module to be active in the plugin and the Login User After Successful Verification setting to be enabled, which it is by default.
AI Analysis
Technical Summary
CVE-2021-34646 is a critical authentication bypass vulnerability affecting the Booster for WooCommerce WordPress plugin developed by Pluggabl LLC, specifically versions up to and including 5.4.3. The vulnerability arises from a weakness in the random token generation mechanism within the reset_and_mail_activation_link function located in the ~/includes/class-wcj-emails-verification.php file. This flaw impacts the Email Verification module of the plugin, which when active, allows attackers to exploit the process_email_verification function to bypass authentication controls. The vulnerability enables an attacker to impersonate arbitrary users, including administrators, by triggering an email address verification process that automatically logs the attacker in as the targeted user. This attack vector requires the Email Verification module to be enabled and the 'Login User After Successful Verification' setting to be active, which is the default configuration. The vulnerability is classified under CWE-290 (Authentication Bypass by Spoofing) and has a CVSS v3.1 base score of 9.8, indicating a critical severity level. The exploit requires no privileges, no user interaction, and can be executed remotely over the network, making it highly exploitable. Although no known exploits in the wild have been reported, the potential impact on confidentiality, integrity, and availability is severe, as attackers can gain unauthorized administrative access to affected WordPress sites running this plugin version. This could lead to full site compromise, data theft, defacement, or further malware deployment.
Potential Impact
For European organizations, the impact of this vulnerability is significant, especially for those relying on WooCommerce for e-commerce operations. Successful exploitation can lead to unauthorized administrative access, allowing attackers to manipulate product listings, customer data, and transaction records, potentially resulting in financial losses and reputational damage. Confidential customer information, including personal and payment data, could be exposed, violating GDPR and other data protection regulations, leading to legal penalties. The integrity of the e-commerce platform could be compromised, affecting business continuity and customer trust. Additionally, attackers could use compromised sites as a foothold for lateral movement within corporate networks or to distribute malware to customers. Given the widespread use of WooCommerce across European small and medium enterprises (SMEs), this vulnerability poses a broad risk to the e-commerce sector.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the Booster for WooCommerce plugin to a version where this issue is patched; if an official patch is not yet available, consider temporarily disabling the Email Verification module or the 'Login User After Successful Verification' setting to prevent exploitation. Implement strict monitoring of authentication logs and unusual login activities to detect potential exploitation attempts. Employ web application firewalls (WAFs) with custom rules to block suspicious requests targeting the vulnerable functions. Conduct regular security audits of WordPress plugins and maintain an inventory to ensure timely updates. Additionally, enforce multi-factor authentication (MFA) for administrative accounts to reduce the risk of unauthorized access even if the vulnerability is exploited. Backup site data frequently and ensure backups are stored securely to enable recovery in case of compromise.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2021-34646: CWE-290 Authentication Bypass by Spoofing in Pluggabl LLC Booster for WooCommcerce
Description
Versions up to, and including, 5.4.3, of the Booster for WooCommerce WordPress plugin are vulnerable to authentication bypass via the process_email_verification function due to a random token generation weakness in the reset_and_mail_activation_link function found in the ~/includes/class-wcj-emails-verification.php file. This allows attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Email Verification module to be active in the plugin and the Login User After Successful Verification setting to be enabled, which it is by default.
AI-Powered Analysis
Technical Analysis
CVE-2021-34646 is a critical authentication bypass vulnerability affecting the Booster for WooCommerce WordPress plugin developed by Pluggabl LLC, specifically versions up to and including 5.4.3. The vulnerability arises from a weakness in the random token generation mechanism within the reset_and_mail_activation_link function located in the ~/includes/class-wcj-emails-verification.php file. This flaw impacts the Email Verification module of the plugin, which when active, allows attackers to exploit the process_email_verification function to bypass authentication controls. The vulnerability enables an attacker to impersonate arbitrary users, including administrators, by triggering an email address verification process that automatically logs the attacker in as the targeted user. This attack vector requires the Email Verification module to be enabled and the 'Login User After Successful Verification' setting to be active, which is the default configuration. The vulnerability is classified under CWE-290 (Authentication Bypass by Spoofing) and has a CVSS v3.1 base score of 9.8, indicating a critical severity level. The exploit requires no privileges, no user interaction, and can be executed remotely over the network, making it highly exploitable. Although no known exploits in the wild have been reported, the potential impact on confidentiality, integrity, and availability is severe, as attackers can gain unauthorized administrative access to affected WordPress sites running this plugin version. This could lead to full site compromise, data theft, defacement, or further malware deployment.
Potential Impact
For European organizations, the impact of this vulnerability is significant, especially for those relying on WooCommerce for e-commerce operations. Successful exploitation can lead to unauthorized administrative access, allowing attackers to manipulate product listings, customer data, and transaction records, potentially resulting in financial losses and reputational damage. Confidential customer information, including personal and payment data, could be exposed, violating GDPR and other data protection regulations, leading to legal penalties. The integrity of the e-commerce platform could be compromised, affecting business continuity and customer trust. Additionally, attackers could use compromised sites as a foothold for lateral movement within corporate networks or to distribute malware to customers. Given the widespread use of WooCommerce across European small and medium enterprises (SMEs), this vulnerability poses a broad risk to the e-commerce sector.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the Booster for WooCommerce plugin to a version where this issue is patched; if an official patch is not yet available, consider temporarily disabling the Email Verification module or the 'Login User After Successful Verification' setting to prevent exploitation. Implement strict monitoring of authentication logs and unusual login activities to detect potential exploitation attempts. Employ web application firewalls (WAFs) with custom rules to block suspicious requests targeting the vulnerable functions. Conduct regular security audits of WordPress plugins and maintain an inventory to ensure timely updates. Additionally, enforce multi-factor authentication (MFA) for administrative accounts to reduce the risk of unauthorized access even if the vulnerability is exploited. Backup site data frequently and ensure backups are stored securely to enable recovery in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-06-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc984
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/5/2025, 10:11:17 PM
Last updated: 2/7/2026, 7:41:29 AM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.