CVE-2024-10665
📋 TL;DR
This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to view and delete payment gateway logs without proper authorization. It affects all WordPress sites using the Yaad Sarig Payment Gateway For WC plugin. Attackers can access sensitive payment log data and potentially disrupt audit trails.
💻 Affected Systems
- Yaad Sarig Payment Gateway For WC WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could delete payment transaction logs to cover up fraudulent activities or exfiltrate sensitive payment data including transaction details and customer information.
Likely Case
Low-privilege users viewing payment logs containing sensitive transaction data, potentially leading to data privacy violations and compliance issues.
If Mitigated
With proper access controls and monitoring, impact is limited to unauthorized log viewing by authenticated users, but no payment processing compromise.
🎯 Exploit Status
Exploitation requires authenticated access but is trivial once authenticated. The vulnerability is publicly documented with code references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.2.5 or later
Vendor Advisory: https://plugins.trac.wordpress.org/browser/yaad-sarig-payment-gateway-for-wc/trunk/classes/class-wc-gateway-yaadpay.php
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Yaad Sarig Payment Gateway For WC'. 4. Click 'Update Now' if available, or download version 2.2.5+ from WordPress repository. 5. Activate the updated plugin.
🔧 Temporary Workarounds
Temporary Plugin Deactivation
allDisable the vulnerable plugin until patched, but this will break payment processing functionality.
wp plugin deactivate yaad-sarig-payment-gateway-for-wc
Restrict User Roles
allTemporarily limit Subscriber role creation and review existing low-privilege users.
🧯 If You Can't Patch
- Disable the Yaad Sarig Payment Gateway plugin and use an alternative payment gateway temporarily.
- Implement strict access controls and monitor for suspicious log access patterns from authenticated users.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Installed Plugins for 'Yaad Sarig Payment Gateway For WC' version. If version is 2.2.4 or lower, you are vulnerable.
Check Version:
wp plugin get yaad-sarig-payment-gateway-for-wc --field=version
Verify Fix Applied:
Verify plugin version is 2.2.5 or higher in WordPress admin panel. Test with a Subscriber account that log viewing/deletion functions now return permission errors.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access to /wp-admin/admin-ajax.php with action=yaadpay_view_log or action=yaadpay_delete_log
- Multiple log deletion attempts from non-admin users
- Unusual log access patterns from Subscriber-level accounts
Network Indicators:
- POST requests to admin-ajax.php with yaadpay log actions from non-admin IPs
SIEM Query:
source="wordpress.log" AND ("yaadpay_view_log" OR "yaadpay_delete_log") AND user_role!="administrator"