• Any thoughts or updates for this?

    Category:PLUGIN

    Versions-Affected:<= 2.1

    Type:Cross Site Request Forgery

    Severity:MEDIUM

    Description:Muhammad Daffa discovered and reported this Cross Site Request Forgery (CSRF) vulnerability in WordPress Side Cart Woocommerce (Ajax) Plugin. This could allow a malicious actor to force higher privileged users to execute unwanted actions under their current authentication. For example a password change which will then allow the malicious actor to login into the admin account.

Viewing 12 replies - 1 through 12 (of 12 total)
  • WordFence reporting it as well. I’m still parsing this:

    The Side Cart Woocommerce (Ajax) plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.1. This is due to missing or incorrect nonce validation on one of its functions. This makes it possible for unauthenticated attackers to invoke this function and reset the plugin’s settings, via forged request granted they can trick a site administrator into performing an action such as clicking on a link. Please note that the developer released a patch, but did not update the patched version so it is both vulnerable and patched in version 2.1.

    …Saw somewhere that it was initially reported a month ago – last update to this plugin was 7 days ago… but the developer has removed all mention of this plugin on their site as they look to have moved attention to a paid version?

    Plugin Author xootix

    (@xootix)

    Thanks for the quick response, and apologies I didn’t see it on your site. I wondered if a full delete and reinstall was to be the next step, but that odd verbage in the WordFence description threw me.

    Nice work, and thanks again!

    Thread Starter espressivo

    (@espressivo)

    We deleted and re-installed and WpRemote/blogvault is still showing the flaw.

    Plugin Author xootix

    (@xootix)

    Please contact with blogvault.
    The issue is patched from our end.
    You don’t have to worry though. It isn’t a vulnerability.

    Hi @xootix but Wordfence still reports as critical:

    They say on their site this:

    Description

    The Side Cart Woocommerce (Ajax) plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.1. This is due to missing or incorrect nonce validation on one of its functions. This makes it possible for unauthenticated attackers to invoke this function and reset the plugin’s settings, via forged request granted they can trick a site administrator into performing an action such as clicking on a link. Please note that the developer released a patch, but did not update the patched version so it is both vulnerable and patched in version 2.1.

    So 2.1 is still sort of really not patched for them.

    How can I solve not getting this error every time the Worfence scan runs?

    • This reply was modified 3 years, 2 months ago by baltas.
    • This reply was modified 3 years, 2 months ago by baltas.

    Also deleted and reinstalled and still getting the same critical vulnerability warning. Also getting warnings that the following files differed from the repo:

    /plugins/side-cart-woocommerce/includes/xoo-framework/admin/class-xoo-admin-settings.php

    and

    /plugins/side-cart-woocommerce/includes/xoo-framework/admin/templates/xoo-admin-settings-output.php

    but when I look, there are no differences seen in the nonce.

    Same here ….tried on 2 site a re-install and wordfence scan still detects it as an Issue

    Hi, so no evolution on this problem?

    Still getting…

    Should I abandon this plugin since has not being fixed or lack off support?

    • This reply was modified 3 years, 1 month ago by baltas.
    • This reply was modified 3 years, 1 month ago by baltas.
    • This reply was modified 3 years, 1 month ago by baltas.
    Thread Starter espressivo

    (@espressivo)

    What baltas said…

    Plugin Author xootix

    (@xootix)

    Apologies for the inconvenience.
    I’ve written to wordfence support. I will soon do the needful as soon as they get back to me.

    baltas

    (@baltas)

    Great, latest update fixed everything.

    Thanks !!!

Viewing 12 replies - 1 through 12 (of 12 total)

The topic ‘Blogvault showing this plugin vulnerable’ is closed to new replies.