{"containers":{"cna":{"affected":[{"product":"Stripe for WooCommerce","vendor":"Stripe for WooCommerce","versions":[{"status":"affected","version":"3.0.0 - 3.3.9"}]}],"credits":[{"lang":"en","value":"Margaux DABERT from Intrinsec"}],"datePublic":"2021-10-01T00:00:00.000Z","descriptions":[{"lang":"en","value":"The Stripe for WooCommerce WordPress plugin is missing a capability check on the save() function found in the ~/includes/admin/class-wc-stripe-admin-user-edit.php file that makes it possible for attackers to configure their account to use other site users unique STRIPE identifier and make purchases with their payment accounts. This affects versions 3.0.0 - 3.3.9."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-862","description":"CWE-862 Missing Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-10-04T17:21:49.000Z","orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39347"},{"tags":["x_refsource_MISC"],"url":"https://plugins.trac.wordpress.org/changeset/2601162/woo-stripe-payment/trunk/includes/admin/class-wc-stripe-admin-user-edit.php"}],"solutions":[{"lang":"en","value":"Update to version 3.3.10 or newer."}],"source":{"discovery":"EXTERNAL"},"title":"Stripe for WooCommerce 3.0.0 - 3.3.9 Missing Authorization Controls to Financial Account Hijacking","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"AKA":"Wordfence","ASSIGNER":"security@wordfence.com","DATE_PUBLIC":"2021-10-01T15:29:00.000Z","ID":"CVE-2021-39347","STATE":"PUBLIC","TITLE":"Stripe for WooCommerce 3.0.0 - 3.3.9 Missing Authorization Controls to Financial Account Hijacking"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Stripe for WooCommerce","version":{"version_data":[{"version_affected":"=","version_name":"3.0.0 - 3.3.9","version_value":"3.0.0 - 3.3.9"}]}}]},"vendor_name":"Stripe for WooCommerce"}]}},"credit":[{"lang":"eng","value":"Margaux DABERT from Intrinsec"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Stripe for WooCommerce WordPress plugin is missing a capability check on the save() function found in the ~/includes/admin/class-wc-stripe-admin-user-edit.php file that makes it possible for attackers to configure their account to use other site users unique STRIPE identifier and make purchases with their payment accounts. This affects versions 3.0.0 - 3.3.9."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-862 Missing Authorization"}]}]},"references":{"reference_data":[{"name":"https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39347","refsource":"MISC","url":"https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39347"},{"name":"https://plugins.trac.wordpress.org/changeset/2601162/woo-stripe-payment/trunk/includes/admin/class-wc-stripe-admin-user-edit.php","refsource":"MISC","url":"https://plugins.trac.wordpress.org/changeset/2601162/woo-stripe-payment/trunk/includes/admin/class-wc-stripe-admin-user-edit.php"}]},"solution":[{"lang":"en","value":"Update to version 3.3.10 or newer."}],"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T02:06:42.468Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39347"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://plugins.trac.wordpress.org/changeset/2601162/woo-stripe-payment/trunk/includes/admin/class-wc-stripe-admin-user-edit.php"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-31T18:10:39.009092Z","id":"CVE-2021-39347","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-31T18:11:15.927Z"}}]},"cveMetadata":{"assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","assignerShortName":"Wordfence","cveId":"CVE-2021-39347","datePublished":"2021-10-04T17:21:49.430Z","dateReserved":"2021-08-20T00:00:00.000Z","dateUpdated":"2025-03-31T18:11:15.927Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}