The NP Quote Request for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.9.179 due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to read the content of quote requests.
References
Configurations
Configuration 1 (hide)
|
History
27 Mar 2025, 15:27
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Neahplugins
Neahplugins np Quote Request For Woocommerce |
|
CPE | cpe:2.3:a:neahplugins:np_quote_request_for_woocommerce:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/changeset/3256816/ - Patch | |
References | () https://wordpress.org/plugins/woo-rfq-for-woocommerce/#developers - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/5991c86b-6785-41a6-a5df-c65e8a28201c?source=cve - Third Party Advisory |
20 Mar 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 12:15
Updated : 2025-03-27 15:27
NVD link : CVE-2024-13558
Mitre link : CVE-2024-13558
CVE.ORG link : CVE-2024-13558
JSON object : View
Products Affected
neahplugins
- np_quote_request_for_woocommerce
CWE
CWE-639
Authorization Bypass Through User-Controlled Key