Authentication vulnerability in PayU CommercePro Plugin 3.8.3

The PayU CommercePro Plugin for WordPress is at risk of being hacked because of a problem in all versions, including 3.8.3. The issue is with two parts of the plugin called /wp-json/payu/v1/generate-user-token and /wp-json/payu/v1/get-shipping-cost. These parts don’t check to see if the user is who they say they are before giving them certain permissions. This means that someone who isn’t logged in could create a new account with administrative privileges.

Detected in:

PayU CommercePro Plugin open vulnerable versions: >= * <= 3.8.3

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.