
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-34646 affects versions up to 5.4.3 of the Booster for WooCommerce WordPress plugin. The vulnerability is an authentication bypass issue discovered in the processemailverification function, which was disclosed on August 24, 2021. The plugin's Email Verification module, when active with the default setting 'Login User After Successful Verification' enabled, is susceptible to this security flaw (Wordfence Blog, WPScan).
The vulnerability stems from a random token generation weakness in the resetandmailactivationlink function located in the ~/includes/class-wcj-emails-verification.php file. The issue has been assigned a CVSS v3.1 score of 9.8 (Critical) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The vulnerability is classified under CWE-330 (Use of Insufficiently Random Values) and CWE-290 (Authentication Bypass by Spoofing) (NVD).
This vulnerability allows attackers to impersonate users and trigger email address verification for arbitrary accounts, including administrative accounts. Once exploited, attackers can automatically log in as any user, including site administrators, potentially gaining complete control over the affected WordPress installation (Wordfence Blog).
The vulnerability has been patched in version 5.4.4 of the Booster for WooCommerce plugin. Site administrators are strongly advised to update to this version or later to protect against potential exploitation (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."