Skip to main content

CVE-2022-34344: CWE-862 Missing Authorization in Rymera Web Co Wholesale Suite – WooCommerce Wholesale Prices, B2B, Catalog Mode, Order Form, Wholesale User Roles, Dynamic Pricing & More

Low
VulnerabilityCVE-2022-34344cvecve-2022-34344cwe-862
Published: Mon Jan 08 2024 (01/08/2024, 21:13:45 UTC)
Source: CVE
Vendor/Project: Rymera Web Co
Product: Wholesale Suite – WooCommerce Wholesale Prices, B2B, Catalog Mode, Order Form, Wholesale User Roles, Dynamic Pricing & More

Description

Missing Authorization vulnerability in Rymera Web Co Wholesale Suite – WooCommerce Wholesale Prices, B2B, Catalog Mode, Order Form, Wholesale User Roles, Dynamic Pricing & More.This issue affects Wholesale Suite – WooCommerce Wholesale Prices, B2B, Catalog Mode, Order Form, Wholesale User Roles, Dynamic Pricing & More: from n/a through 2.1.5.

AI-Powered Analysis

AILast updated: 07/08/2025, 21:41:44 UTC

Technical Analysis

CVE-2022-34344 is a Missing Authorization vulnerability (CWE-862) identified in the Rymera Web Co Wholesale Suite plugin for WooCommerce, which provides wholesale pricing, B2B features, catalog mode, order forms, wholesale user roles, and dynamic pricing functionalities. This vulnerability affects versions up to 2.1.5 of the plugin. The core issue is that certain actions or resources within the plugin lack proper authorization checks, allowing users with limited privileges (low-level privileges) to perform operations that should be restricted. According to the CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L), the vulnerability can be exploited remotely over the network without user interaction, requires low privileges, and impacts integrity and availability but not confidentiality. Specifically, an authenticated user with some level of access can manipulate or disrupt wholesale pricing or order processing functions, potentially altering prices or orders, or causing denial of service conditions. Although no known exploits are reported in the wild, the vulnerability presents a moderate risk due to the ease of exploitation and the potential to disrupt business operations. The lack of patch links suggests that a fix may not yet be publicly available or widely distributed, increasing the urgency for affected organizations to monitor updates and consider interim controls.

Potential Impact

For European organizations using WooCommerce with the Rymera Wholesale Suite plugin, this vulnerability could lead to unauthorized modification of wholesale pricing or order data, undermining business integrity and causing financial discrepancies. Attackers with low-level access could manipulate pricing or order details, potentially leading to revenue loss, customer dissatisfaction, or supply chain disruptions. Availability impacts could manifest as denial of service or degraded functionality in wholesale operations, affecting B2B sales channels critical to many European retailers and distributors. Given the plugin’s role in managing wholesale user roles and dynamic pricing, exploitation could also compromise trust relationships with wholesale customers. Although confidentiality is not directly impacted, the integrity and availability issues could have significant operational and reputational consequences, especially for companies relying heavily on e-commerce platforms for wholesale transactions.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the WooCommerce Wholesale Suite plugin features only to trusted and fully verified users, minimizing the number of users with any level of privilege that could be exploited. 2. Monitor user activity logs closely for unusual changes in pricing or order data to detect potential exploitation attempts early. 3. Implement compensating controls such as additional application-level authorization checks or web application firewalls (WAF) rules to block suspicious requests targeting wholesale suite endpoints. 4. Regularly check for official patches or updates from Rymera Web Co and apply them promptly once available. 5. Consider temporarily disabling the Wholesale Suite plugin or its vulnerable features if the risk is deemed unacceptable and no patch is available. 6. Conduct a thorough review of user roles and permissions within WooCommerce to ensure least privilege principles are enforced. 7. Engage in security testing, including penetration testing focused on authorization controls, to identify and remediate any other potential weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2022-07-22T11:50:37.095Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6830a0ae0acd01a24927411a

Added to database: 5/23/2025, 4:22:06 PM

Last enriched: 7/8/2025, 9:41:44 PM

Last updated: 7/30/2025, 9:54:40 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats