CVE-2024-55996

6.1 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Dreamfox Media Payment gateway per Product for WooCommerce plugin. It allows attackers to exploit incorrectly configured access control security levels, potentially manipulating payment gateway settings or product-specific payment configurations. This affects all WordPress sites using the vulnerable plugin versions.

💻 Affected Systems

Products:
  • Dreamfox Media Payment gateway per Product for WooCommerce
Versions: from n/a through 3.5.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with WooCommerce and the vulnerable plugin enabled. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify payment gateway configurations, redirect payments, or manipulate product-specific payment settings, potentially leading to financial loss, payment interception, or unauthorized access to payment processing functions.

🟠

Likely Case

Unauthorized users could modify payment settings for specific products, potentially enabling payment bypass, changing payment methods, or altering transaction parameters.

🟢

If Mitigated

With proper access controls and authorization checks, only authenticated administrators could modify payment gateway settings, limiting the attack surface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access but may not require full authentication. The vulnerability is in access control mechanisms, making exploitation relatively straightforward once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.5.7 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/woocommerce-product-payments/vulnerability/wordpress-payment-gateway-per-product-for-woocommerce-plugin-3-5-6-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Payment gateway per Product for Woocommerce'. 4. Click 'Update Now' if available. 5. Alternatively, download version 3.5.7+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the plugin until patched, though this will disable product-specific payment gateway functionality.

wp plugin deactivate woocommerce-product-payments

Restrict admin access

all

Implement strict access controls to WordPress admin area and limit user roles that can modify plugin settings.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block unauthorized access to payment gateway configuration endpoints
  • Enable detailed logging and monitoring for any unauthorized access attempts to payment-related functions

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → Payment gateway per Product for Woocommerce → Version. If version is 3.5.6 or earlier, you are vulnerable.

Check Version:

wp plugin get woocommerce-product-payments --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 3.5.7 or later in WordPress admin plugins page.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to payment gateway configuration endpoints
  • Multiple failed authorization attempts on admin-ajax.php or admin-post.php related to payment functions
  • User role escalation attempts

Network Indicators:

  • Unusual API calls to payment configuration endpoints from unauthorized IPs
  • Traffic patterns suggesting enumeration of payment gateway settings

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path="/wp-admin/admin-post.php") AND (http_method="POST") AND (uri_query CONTAINS "payment_gateway" OR uri_query CONTAINS "product_payment") AND (user_role!="administrator")

🔗 References

📤 Share & Export