The Customer Email Verification for WooCommerce plugin for WordPress is vulnerable to Email Verification and Authentication Bypass in all versions up to, and including, 2.7.4 via the use of insufficiently random activation code. This makes it possible for unauthenticated attackers to bypass the email verification, and if both the "Login the user automatically after the account is verified" and "Verify account for current users" options are checked, then it potentially makes it possible for attackers to bypass authentication for other users.
References
Configurations
No configuration.
History
08 Apr 2026, 19:21
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-330 |
21 Nov 2024, 09:42
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://plugins.trac.wordpress.org/browser/emails-verification-for-woocommerce/tags/2.7.4/includes/alg-wc-ev-functions.php#L299 - | |
| References | () https://plugins.trac.wordpress.org/browser/emails-verification-for-woocommerce/tags/2.7.4/includes/class-alg-wc-ev-core.php#L731 - | |
| References | () https://plugins.trac.wordpress.org/changeset/3078804/emails-verification-for-woocommerce#file2 - | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/ebae4b18-5b5f-45c3-86e2-02eefd7abdb7?source=cve - | |
| Summary |
|
30 Apr 2024, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-04-30 09:15
Updated : 2026-04-08 19:21
NVD link : CVE-2024-4185
Mitre link : CVE-2024-4185
CVE.ORG link : CVE-2024-4185
JSON object : View
Products Affected
No product.
CWE
CWE-330
Use of Insufficiently Random Values
