CVE-2024-4185

The Customer Email Verification for WooCommerce plugin for WordPress is vulnerable to Email Verification and Authentication Bypass in all versions up to, and including, 2.7.4 via the use of insufficiently random activation code. This makes it possible for unauthenticated attackers to bypass the email verification, and if both the "Login the user automatically after the account is verified" and "Verify account for current users" options are checked, then it potentially makes it possible for attackers to bypass authentication for other users.
Configurations

No configuration.

History

08 Apr 2026, 19:21

Type Values Removed Values Added
CWE CWE-330

21 Nov 2024, 09:42

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/emails-verification-for-woocommerce/tags/2.7.4/includes/alg-wc-ev-functions.php#L299 - () https://plugins.trac.wordpress.org/browser/emails-verification-for-woocommerce/tags/2.7.4/includes/alg-wc-ev-functions.php#L299 -
References () https://plugins.trac.wordpress.org/browser/emails-verification-for-woocommerce/tags/2.7.4/includes/class-alg-wc-ev-core.php#L731 - () https://plugins.trac.wordpress.org/browser/emails-verification-for-woocommerce/tags/2.7.4/includes/class-alg-wc-ev-core.php#L731 -
References () https://plugins.trac.wordpress.org/changeset/3078804/emails-verification-for-woocommerce#file2 - () https://plugins.trac.wordpress.org/changeset/3078804/emails-verification-for-woocommerce#file2 -
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/ebae4b18-5b5f-45c3-86e2-02eefd7abdb7?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/ebae4b18-5b5f-45c3-86e2-02eefd7abdb7?source=cve -
Summary
  • (es) El complemento Customer Email Verification para WooCommerce para WordPress es vulnerable a la verificación de correo electrónico y a la omisión de autenticación en todas las versiones hasta la 2.7.4 incluida mediante el uso de un código de activación insuficientemente aleatorio. Esto hace posible que los atacantes no autenticados omitan la verificación por correo electrónico, y si están marcadas las opciones "Iniciar sesión con el usuario automáticamente después de verificar la cuenta" y "Verificar cuenta para los usuarios actuales", entonces potencialmente hace posible que los atacantes eludan autenticación para otros usuarios.

30 Apr 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-30 09:15

Updated : 2026-04-08 19:21


NVD link : CVE-2024-4185

Mitre link : CVE-2024-4185

CVE.ORG link : CVE-2024-4185


JSON object : View

Products Affected

No product.

CWE
CWE-330

Use of Insufficiently Random Values