CVE-2021-34646: CWE-290 Authentication Bypass by Spoofing in Pluggabl LLC Booster for WooCommcerce
Versions up to, and including, 5.4.3, of the Booster for WooCommerce WordPress plugin are vulnerable to authentication bypass via the process_email_verification function due to a random token generation weakness in the reset_and_mail_activation_link function found in the ~/includes/class-wcj-emails-verification.php file. This allows attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Email Verification module to be active in the plugin and the Login User After Successful Verification setting to be enabled, which it is by default.
AI Analysis
Technical Summary
CVE-2021-34646 is a critical authentication bypass vulnerability affecting the Booster for WooCommerce WordPress plugin developed by Pluggabl LLC, specifically versions up to and including 5.4.3. The vulnerability arises from a weakness in the random token generation mechanism within the reset_and_mail_activation_link function located in the ~/includes/class-wcj-emails-verification.php file. This flaw impacts the Email Verification module of the plugin, which when active, allows attackers to exploit the process_email_verification function to bypass authentication controls. The vulnerability enables an attacker to impersonate arbitrary users, including administrators, by triggering an email address verification process that automatically logs the attacker in as the targeted user. This attack vector requires the Email Verification module to be enabled and the 'Login User After Successful Verification' setting to be active, which is the default configuration. The vulnerability is classified under CWE-290 (Authentication Bypass by Spoofing) and has a CVSS v3.1 base score of 9.8, indicating a critical severity level. The exploit requires no privileges, no user interaction, and can be executed remotely over the network, making it highly exploitable. Although no known exploits in the wild have been reported, the potential impact on confidentiality, integrity, and availability is severe, as attackers can gain unauthorized administrative access to affected WordPress sites running this plugin version. This could lead to full site compromise, data theft, defacement, or further malware deployment.
Potential Impact
For European organizations, the impact of this vulnerability is significant, especially for those relying on WooCommerce for e-commerce operations. Successful exploitation can lead to unauthorized administrative access, allowing attackers to manipulate product listings, customer data, and transaction records, potentially resulting in financial losses and reputational damage. Confidential customer information, including personal and payment data, could be exposed, violating GDPR and other data protection regulations, leading to legal penalties. The integrity of the e-commerce platform could be compromised, affecting business continuity and customer trust. Additionally, attackers could use compromised sites as a foothold for lateral movement within corporate networks or to distribute malware to customers. Given the widespread use of WooCommerce across European small and medium enterprises (SMEs), this vulnerability poses a broad risk to the e-commerce sector.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the Booster for WooCommerce plugin to a version where this issue is patched; if an official patch is not yet available, consider temporarily disabling the Email Verification module or the 'Login User After Successful Verification' setting to prevent exploitation. Implement strict monitoring of authentication logs and unusual login activities to detect potential exploitation attempts. Employ web application firewalls (WAFs) with custom rules to block suspicious requests targeting the vulnerable functions. Conduct regular security audits of WordPress plugins and maintain an inventory to ensure timely updates. Additionally, enforce multi-factor authentication (MFA) for administrative accounts to reduce the risk of unauthorized access even if the vulnerability is exploited. Backup site data frequently and ensure backups are stored securely to enable recovery in case of compromise.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2021-34646: CWE-290 Authentication Bypass by Spoofing in Pluggabl LLC Booster for WooCommcerce
Description
Versions up to, and including, 5.4.3, of the Booster for WooCommerce WordPress plugin are vulnerable to authentication bypass via the process_email_verification function due to a random token generation weakness in the reset_and_mail_activation_link function found in the ~/includes/class-wcj-emails-verification.php file. This allows attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Email Verification module to be active in the plugin and the Login User After Successful Verification setting to be enabled, which it is by default.
AI-Powered Analysis
Technical Analysis
CVE-2021-34646 is a critical authentication bypass vulnerability affecting the Booster for WooCommerce WordPress plugin developed by Pluggabl LLC, specifically versions up to and including 5.4.3. The vulnerability arises from a weakness in the random token generation mechanism within the reset_and_mail_activation_link function located in the ~/includes/class-wcj-emails-verification.php file. This flaw impacts the Email Verification module of the plugin, which when active, allows attackers to exploit the process_email_verification function to bypass authentication controls. The vulnerability enables an attacker to impersonate arbitrary users, including administrators, by triggering an email address verification process that automatically logs the attacker in as the targeted user. This attack vector requires the Email Verification module to be enabled and the 'Login User After Successful Verification' setting to be active, which is the default configuration. The vulnerability is classified under CWE-290 (Authentication Bypass by Spoofing) and has a CVSS v3.1 base score of 9.8, indicating a critical severity level. The exploit requires no privileges, no user interaction, and can be executed remotely over the network, making it highly exploitable. Although no known exploits in the wild have been reported, the potential impact on confidentiality, integrity, and availability is severe, as attackers can gain unauthorized administrative access to affected WordPress sites running this plugin version. This could lead to full site compromise, data theft, defacement, or further malware deployment.
Potential Impact
For European organizations, the impact of this vulnerability is significant, especially for those relying on WooCommerce for e-commerce operations. Successful exploitation can lead to unauthorized administrative access, allowing attackers to manipulate product listings, customer data, and transaction records, potentially resulting in financial losses and reputational damage. Confidential customer information, including personal and payment data, could be exposed, violating GDPR and other data protection regulations, leading to legal penalties. The integrity of the e-commerce platform could be compromised, affecting business continuity and customer trust. Additionally, attackers could use compromised sites as a foothold for lateral movement within corporate networks or to distribute malware to customers. Given the widespread use of WooCommerce across European small and medium enterprises (SMEs), this vulnerability poses a broad risk to the e-commerce sector.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the Booster for WooCommerce plugin to a version where this issue is patched; if an official patch is not yet available, consider temporarily disabling the Email Verification module or the 'Login User After Successful Verification' setting to prevent exploitation. Implement strict monitoring of authentication logs and unusual login activities to detect potential exploitation attempts. Employ web application firewalls (WAFs) with custom rules to block suspicious requests targeting the vulnerable functions. Conduct regular security audits of WordPress plugins and maintain an inventory to ensure timely updates. Additionally, enforce multi-factor authentication (MFA) for administrative accounts to reduce the risk of unauthorized access even if the vulnerability is exploited. Backup site data frequently and ensure backups are stored securely to enable recovery in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2021-06-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc984
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/5/2025, 10:11:17 PM
Last updated: 7/30/2025, 2:18:54 AM
Views: 15
Related Threats
CVE-2025-43201: An app may be able to unexpectedly leak a user's credentials in Apple Apple Music Classical for Android
HighCVE-2025-8959: CWE-59: Improper Link Resolution Before File Access (Link Following) in HashiCorp Shared library
HighCVE-2025-44201
LowCVE-2025-36088: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Storage TS4500 Library
MediumCVE-2025-43490: CWE-59 Improper Link Resolution Before File Access ('Link Following') in HP, Inc. HP Hotkey Support Software
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.