CVE-2024-10665

5.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to view and delete payment gateway logs without proper authorization. It affects all WordPress sites using the Yaad Sarig Payment Gateway For WC plugin. Attackers can access sensitive payment log data and potentially disrupt audit trails.

💻 Affected Systems

Products:
  • Yaad Sarig Payment Gateway For WC WordPress plugin
Versions: All versions up to and including 2.2.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin activated. Any authenticated user (Subscriber role or higher) can exploit this.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete payment transaction logs to cover up fraudulent activities or exfiltrate sensitive payment data including transaction details and customer information.

🟠

Likely Case

Low-privilege users viewing payment logs containing sensitive transaction data, potentially leading to data privacy violations and compliance issues.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized log viewing by authenticated users, but no payment processing compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is trivial once authenticated. The vulnerability is publicly documented with code references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.5 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/yaad-sarig-payment-gateway-for-wc/trunk/classes/class-wc-gateway-yaadpay.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Yaad Sarig Payment Gateway For WC'. 4. Click 'Update Now' if available, or download version 2.2.5+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched, but this will break payment processing functionality.

wp plugin deactivate yaad-sarig-payment-gateway-for-wc

Restrict User Roles

all

Temporarily limit Subscriber role creation and review existing low-privilege users.

🧯 If You Can't Patch

  • Disable the Yaad Sarig Payment Gateway plugin and use an alternative payment gateway temporarily.
  • Implement strict access controls and monitor for suspicious log access patterns from authenticated users.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Yaad Sarig Payment Gateway For WC' version. If version is 2.2.4 or lower, you are vulnerable.

Check Version:

wp plugin get yaad-sarig-payment-gateway-for-wc --field=version

Verify Fix Applied:

Verify plugin version is 2.2.5 or higher in WordPress admin panel. Test with a Subscriber account that log viewing/deletion functions now return permission errors.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to /wp-admin/admin-ajax.php with action=yaadpay_view_log or action=yaadpay_delete_log
  • Multiple log deletion attempts from non-admin users
  • Unusual log access patterns from Subscriber-level accounts

Network Indicators:

  • POST requests to admin-ajax.php with yaadpay log actions from non-admin IPs

SIEM Query:

source="wordpress.log" AND ("yaadpay_view_log" OR "yaadpay_delete_log") AND user_role!="administrator"

🔗 References

📤 Share & Export