Subscribe
Trending News
By using our website, you agree to the use of our cookies.

Category: CYBER SECURITY

CYBER SECURITY, FEATURED

Critical Authentication Bypass Vulnerability Patched In Booster For WooCommerce Plugin

In order to exploit this vulnerability, an attacker would need to execute two actions. The first action an attacker would need to perform involves sending a request to the vulnerable site’s home URL with the wcj_user_id parameter set to the user ID that the attacker would like to impersonate. This would likely be set to a user ID of 1 because the first user account typically created on WordPress sites is the administrative user account and this is rarely changed.