{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T13:40:04.366","vulnerabilities":[{"cve":{"id":"CVE-2021-39347","sourceIdentifier":"security@wordfence.com","published":"2021-10-04T18:15:09.433","lastModified":"2024-11-21T06:19:22.160","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Stripe for WooCommerce WordPress plugin is missing a capability check on the save() function found in the ~/includes/admin/class-wc-stripe-admin-user-edit.php file that makes it possible for attackers to configure their account to use other site users unique STRIPE identifier and make purchases with their payment accounts. This affects versions 3.0.0 - 3.3.9."},{"lang":"es","value":"El plugin Stripe for WooCommerce de WordPress carece de una comprobación de capacidad en la función save() que se encuentra en el archivo ~/includes/admin/class-wc-stripe-admin-user-edit.php que hace posible que atacantes configuren su cuenta para usar el identificador único de Stripe de otros usuarios del sitio y realicen compras con sus cuentas de pago. Esto afecta a versiones 3.0.0 - 3.3.9"}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:paymentplugins:stripe_for_woocommerce:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"3.0.0","versionEndIncluding":"3.3.9","matchCriteriaId":"F773FE71-32C7-44F9-B4D8-11C9157A1773"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/changeset/2601162/woo-stripe-payment/trunk/includes/admin/class-wc-stripe-admin-user-edit.php","source":"security@wordfence.com","tags":["Patch","Third Party Advisory"]},{"url":"https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39347","source":"security@wordfence.com","tags":["Third Party Advisory"]},{"url":"https://plugins.trac.wordpress.org/changeset/2601162/woo-stripe-payment/trunk/includes/admin/class-wc-stripe-admin-user-edit.php","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39347","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}