CVE-2022-3946: CWE-862 Missing Authorization in Unknown Welcart e-Commerce
The Welcart e-Commerce WordPress plugin before 2.8.4 does not have authorisation and CSRF in an AJAX action, allowing any logged-in user to create, update and delete shipping methods.
AI Analysis
Technical Summary
CVE-2022-3946 is a security vulnerability identified in the Welcart e-Commerce WordPress plugin versions prior to 2.8.4. The core issue stems from missing authorization controls combined with a lack of Cross-Site Request Forgery (CSRF) protection in an AJAX action endpoint. Specifically, any authenticated user with a valid WordPress login—regardless of their privilege level—can exploit this flaw to create, update, or delete shipping methods within the e-commerce platform. This vulnerability is classified under CWE-862 (Missing Authorization) and CWE-352 (Cross-Site Request Forgery). The absence of proper authorization checks means that the plugin does not verify whether the logged-in user has the appropriate permissions to perform these sensitive operations. Additionally, the lack of CSRF tokens allows attackers to craft malicious requests that can be executed without the user's explicit consent if they are logged in. The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). This means the vulnerability can be exploited remotely over the network by any authenticated user, leading to unauthorized modification of shipping methods, which can disrupt business operations or be leveraged for further attacks such as fraud or manipulation of order fulfillment processes. No known public exploits have been reported in the wild as of the publication date, and no official patches are linked in the provided data, though the vulnerability was addressed in version 2.8.4 of the plugin. The vulnerability affects the Welcart e-Commerce plugin, a WordPress plugin used primarily in Japan but also by some European merchants, especially small to medium-sized businesses using WordPress for online retail. The technical details confirm the vulnerability was reserved in November 2022 and publicly disclosed in December 2022 by WPScan and enriched by CISA.
Potential Impact
For European organizations using the Welcart e-Commerce plugin, this vulnerability poses a significant risk to the integrity of their e-commerce operations. Unauthorized modification of shipping methods can lead to incorrect shipping charges, manipulation of delivery options, or disruption of logistics workflows. Attackers could exploit this to cause financial losses, damage customer trust, or create operational chaos. Since the vulnerability requires only authenticated access, attackers could leverage compromised or low-privilege user accounts to escalate their impact without needing administrator credentials. This is particularly concerning for organizations with multiple user roles or where user account hygiene is weak. The lack of confidentiality impact reduces the risk of data leakage, but the high integrity impact means business processes can be manipulated, potentially facilitating fraud or supply chain attacks. Given the plugin’s niche usage in Europe, the impact is more pronounced for small and medium enterprises relying on this plugin for their online sales. Additionally, the absence of CSRF protection increases the risk of automated or social engineering attacks that can trigger unauthorized changes without user awareness. The vulnerability does not affect availability directly but could indirectly cause service disruptions if shipping configurations become inconsistent or invalid.
Mitigation Recommendations
1. Immediate upgrade to Welcart e-Commerce plugin version 2.8.4 or later, where this vulnerability has been addressed, is the most effective mitigation. 2. Restrict user roles and permissions rigorously within WordPress to ensure only trusted users have access to shipping method management. 3. Implement multi-factor authentication (MFA) for all user accounts to reduce the risk of compromised credentials being used to exploit this vulnerability. 4. Monitor and audit changes to shipping methods regularly to detect unauthorized modifications promptly. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting shipping method endpoints. 6. Educate users about phishing and social engineering risks to prevent attackers from leveraging CSRF-like attacks. 7. If immediate patching is not feasible, consider temporarily disabling the affected AJAX actions or restricting access to the plugin’s shipping management features via IP whitelisting or other network controls. 8. Review and harden WordPress security configurations, including limiting plugin installations to trusted sources and keeping all components updated.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2022-3946: CWE-862 Missing Authorization in Unknown Welcart e-Commerce
Description
The Welcart e-Commerce WordPress plugin before 2.8.4 does not have authorisation and CSRF in an AJAX action, allowing any logged-in user to create, update and delete shipping methods.
AI-Powered Analysis
Technical Analysis
CVE-2022-3946 is a security vulnerability identified in the Welcart e-Commerce WordPress plugin versions prior to 2.8.4. The core issue stems from missing authorization controls combined with a lack of Cross-Site Request Forgery (CSRF) protection in an AJAX action endpoint. Specifically, any authenticated user with a valid WordPress login—regardless of their privilege level—can exploit this flaw to create, update, or delete shipping methods within the e-commerce platform. This vulnerability is classified under CWE-862 (Missing Authorization) and CWE-352 (Cross-Site Request Forgery). The absence of proper authorization checks means that the plugin does not verify whether the logged-in user has the appropriate permissions to perform these sensitive operations. Additionally, the lack of CSRF tokens allows attackers to craft malicious requests that can be executed without the user's explicit consent if they are logged in. The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). This means the vulnerability can be exploited remotely over the network by any authenticated user, leading to unauthorized modification of shipping methods, which can disrupt business operations or be leveraged for further attacks such as fraud or manipulation of order fulfillment processes. No known public exploits have been reported in the wild as of the publication date, and no official patches are linked in the provided data, though the vulnerability was addressed in version 2.8.4 of the plugin. The vulnerability affects the Welcart e-Commerce plugin, a WordPress plugin used primarily in Japan but also by some European merchants, especially small to medium-sized businesses using WordPress for online retail. The technical details confirm the vulnerability was reserved in November 2022 and publicly disclosed in December 2022 by WPScan and enriched by CISA.
Potential Impact
For European organizations using the Welcart e-Commerce plugin, this vulnerability poses a significant risk to the integrity of their e-commerce operations. Unauthorized modification of shipping methods can lead to incorrect shipping charges, manipulation of delivery options, or disruption of logistics workflows. Attackers could exploit this to cause financial losses, damage customer trust, or create operational chaos. Since the vulnerability requires only authenticated access, attackers could leverage compromised or low-privilege user accounts to escalate their impact without needing administrator credentials. This is particularly concerning for organizations with multiple user roles or where user account hygiene is weak. The lack of confidentiality impact reduces the risk of data leakage, but the high integrity impact means business processes can be manipulated, potentially facilitating fraud or supply chain attacks. Given the plugin’s niche usage in Europe, the impact is more pronounced for small and medium enterprises relying on this plugin for their online sales. Additionally, the absence of CSRF protection increases the risk of automated or social engineering attacks that can trigger unauthorized changes without user awareness. The vulnerability does not affect availability directly but could indirectly cause service disruptions if shipping configurations become inconsistent or invalid.
Mitigation Recommendations
1. Immediate upgrade to Welcart e-Commerce plugin version 2.8.4 or later, where this vulnerability has been addressed, is the most effective mitigation. 2. Restrict user roles and permissions rigorously within WordPress to ensure only trusted users have access to shipping method management. 3. Implement multi-factor authentication (MFA) for all user accounts to reduce the risk of compromised credentials being used to exploit this vulnerability. 4. Monitor and audit changes to shipping methods regularly to detect unauthorized modifications promptly. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting shipping method endpoints. 6. Educate users about phishing and social engineering risks to prevent attackers from leveraging CSRF-like attacks. 7. If immediate patching is not feasible, consider temporarily disabling the affected AJAX actions or restricting access to the plugin’s shipping management features via IP whitelisting or other network controls. 8. Review and harden WordPress security configurations, including limiting plugin installations to trusted sources and keeping all components updated.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-11-11T11:37:39.102Z
- Cisa Enriched
- true
Threat ID: 682d9848c4522896dcbf5ec4
Added to database: 5/21/2025, 9:09:28 AM
Last enriched: 6/22/2025, 5:50:18 AM
Last updated: 8/18/2025, 5:32:21 AM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.