PayU Plugin Panic: WordPress Sites Vulnerable to Account Hijacking!

PayU CommercePro users beware: a critical vulnerability lets attackers hijack WordPress accounts with a sneaky shipping cost API maneuver. Exploitation involves a hardcoded email and clever API calls. Despite a 30-day disclosure, no fix is in sight. Time to deactivate and delete, or risk a hostile takeover of your admin account!

Pro Dashboard

Hot Take:

Looks like the PayU CommercePro plugin is playing a dangerous game of “Guess Who?” with WordPress accounts. Who knew granting admin access could be as easy as fetching shipping costs? It’s time to ship these vulnerabilities off to a deserted island.

Key Points:

  • PayU CommercePro plugin vulnerability allows account hijacking on WordPress sites.
  • Flaw located in the /payu/v1/get-shipping-cost API route.
  • Vulnerability stems from unsafe handling of update_cart_data() function.
  • Exploit involves generating an auth token with a hardcoded email.
  • No patch released despite a 30-day disclosure window by PatchStack.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?