Wiz Agents & Workflows are here

CVE-2023-28121
WordPress vulnerability analysis and mitigation

Overview

An authentication bypass vulnerability (CVE-2023-28121) was discovered in the WooCommerce Payments plugin for WordPress affecting versions 5.6.1 and lower. The vulnerability, discovered on March 22, 2023, allows an unauthenticated attacker to send requests on behalf of an elevated user, such as an administrator, potentially leading to complete site takeover. The plugin, which has over 600,000 active installations, received a critical CVSS base score of 9.8 (NVD, Woo Advisory).

Technical details

The vulnerability stems from an improper authentication mechanism in the Platform_Checkout_Session::init() function. The flaw allows unauthenticated attackers to create an admin account and take over the blog by sending specially crafted requests to the WordPress REST API endpoint. The vulnerability was assigned CWE-287 (Improper Authentication) and received a CVSS v3.1 base score of 9.8, indicating critical severity (WPScan, NVD).

Impact

Successful exploitation of this vulnerability allows remote, unauthenticated attackers to gain administrative access to affected WordPress sites. This could lead to complete site takeover, ability to impersonate arbitrary users including administrators, and potential compromise of sensitive data (FortiGuard).

Mitigation and workarounds

The vulnerability was patched in version 5.6.2, released on March 23, 2023. WordPress.org's Plugin Team implemented auto-updates for affected versions. Site administrators should ensure they are running one of the patched versions (4.8.2, 4.9.1, 5.0.4, 5.1.3, 5.2.2, 5.3.1, 5.4.1, 5.5.2, 5.6.2, or later). Additionally, it is recommended to check for unexpected admin users or posts, update admin passwords, and rotate API keys (Woo Advisory).

Community reactions

WooCommerce immediately deactivated the impacted services and mitigated the issue for all websites hosted on WordPress.com, Pressable, and WPVIP upon discovery. The vulnerability was reported through their HackerOne program by Michael Mazzolini of GoldNetwork. The WooPay beta program was temporarily disabled as a precautionary measure (Woo Advisory).

Additional resources


SourceThis report was generated using AI

Related WordPress vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-4347HIGH8.1
  • mw-wp-form
NoYesApr 02, 2026
CVE-2026-5032HIGH7.5
  • w3-total-cache
NoYesApr 02, 2026
CVE-2026-0686HIGH7.2
  • webmention
NoYesApr 02, 2026
CVE-2026-34890MEDIUM6.5
  • mstw-league-manager
NoNoApr 02, 2026
CVE-2026-0688MEDIUM6.4
  • webmention
NoYesApr 02, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management