CVE-2024-10665
Yaad Sarig Payment Gateway For WC <= 2.2.4 - Missing Authorization to Authenticated (Subscriber+) Log Read/Deletion
CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th
The Yaad Sarig Payment Gateway For WC plugin for WordPress is vulnerable to unauthorized modification & access of data due to a missing capability check on the yaadpay_view_log_callback() and yaadpay_delete_log_callback() functions in all versions up to, and including, 2.2.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view and delete logs.
| CWE | CWE-862 |
| Vendor | yaadsarig |
| Product | yaad sarig payment gateway for wc |
| Published | Nov 20, 2024 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for yaadsarig yaad sarig payment gateway for wc
Be the first to know when new medium vulnerabilities affecting yaadsarig yaad sarig payment gateway for wc are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
yaadsarig / Yaad Sarig Payment Gateway For WC
0 โค 2.2.4
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/10409673-43dc-4c05-a996-120d753ebd6d?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/yaad-sarig-payment-gateway-for-wc/trunk/classes/class-wc-gateway-yaadpay.php#L2518 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3197312%40yaad-sarig-payment-gateway-for-wc&new=3197312%40yaad-sarig-payment-gateway-for-wc&sfp_email=&sfph_mail=
Credits
BrokenAC ignore