Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-34646: CWE-290 Authentication Bypass by Spoofing in Pluggabl LLC Booster for WooCommcerce

0
Critical
VulnerabilityCVE-2021-34646cvecve-2021-34646cwe-290
Published: Mon Aug 30 2021 (08/30/2021, 18:03:51 UTC)
Source: CVE
Vendor/Project: Pluggabl LLC
Product: Booster for WooCommcerce

Description

Versions up to, and including, 5.4.3, of the Booster for WooCommerce WordPress plugin are vulnerable to authentication bypass via the process_email_verification function due to a random token generation weakness in the reset_and_mail_activation_link function found in the ~/includes/class-wcj-emails-verification.php file. This allows attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Email Verification module to be active in the plugin and the Login User After Successful Verification setting to be enabled, which it is by default.

AI-Powered Analysis

AILast updated: 07/05/2025, 22:11:17 UTC

Technical Analysis

CVE-2021-34646 is a critical authentication bypass vulnerability affecting the Booster for WooCommerce WordPress plugin developed by Pluggabl LLC, specifically versions up to and including 5.4.3. The vulnerability arises from a weakness in the random token generation mechanism within the reset_and_mail_activation_link function located in the ~/includes/class-wcj-emails-verification.php file. This flaw impacts the Email Verification module of the plugin, which when active, allows attackers to exploit the process_email_verification function to bypass authentication controls. The vulnerability enables an attacker to impersonate arbitrary users, including administrators, by triggering an email address verification process that automatically logs the attacker in as the targeted user. This attack vector requires the Email Verification module to be enabled and the 'Login User After Successful Verification' setting to be active, which is the default configuration. The vulnerability is classified under CWE-290 (Authentication Bypass by Spoofing) and has a CVSS v3.1 base score of 9.8, indicating a critical severity level. The exploit requires no privileges, no user interaction, and can be executed remotely over the network, making it highly exploitable. Although no known exploits in the wild have been reported, the potential impact on confidentiality, integrity, and availability is severe, as attackers can gain unauthorized administrative access to affected WordPress sites running this plugin version. This could lead to full site compromise, data theft, defacement, or further malware deployment.

Potential Impact

For European organizations, the impact of this vulnerability is significant, especially for those relying on WooCommerce for e-commerce operations. Successful exploitation can lead to unauthorized administrative access, allowing attackers to manipulate product listings, customer data, and transaction records, potentially resulting in financial losses and reputational damage. Confidential customer information, including personal and payment data, could be exposed, violating GDPR and other data protection regulations, leading to legal penalties. The integrity of the e-commerce platform could be compromised, affecting business continuity and customer trust. Additionally, attackers could use compromised sites as a foothold for lateral movement within corporate networks or to distribute malware to customers. Given the widespread use of WooCommerce across European small and medium enterprises (SMEs), this vulnerability poses a broad risk to the e-commerce sector.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the Booster for WooCommerce plugin to a version where this issue is patched; if an official patch is not yet available, consider temporarily disabling the Email Verification module or the 'Login User After Successful Verification' setting to prevent exploitation. Implement strict monitoring of authentication logs and unusual login activities to detect potential exploitation attempts. Employ web application firewalls (WAFs) with custom rules to block suspicious requests targeting the vulnerable functions. Conduct regular security audits of WordPress plugins and maintain an inventory to ensure timely updates. Additionally, enforce multi-factor authentication (MFA) for administrative accounts to reduce the risk of unauthorized access even if the vulnerability is exploited. Backup site data frequently and ensure backups are stored securely to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2021-06-10T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc984

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/5/2025, 10:11:17 PM

Last updated: 2/7/2026, 7:41:29 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats