CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4DescriptionNVD
The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_or_activate_addon_plugins() function and a weak nonce hash in all versions up to, and including, 3.5.3. This makes it possible for unauthenticated attackers to install arbitrary plugins on the site that can be leveraged to further infect a vulnerable site.
AnalysisAI
The FunnelKit plugin for WordPress (versions ≤3.5.3) contains a critical vulnerability allowing unauthenticated attackers to install arbitrary plugins due to missing capability checks and weak nonce validation in the install_or_activate_addon_plugins() function. This is a pre-authentication remote code execution vector with a CVSS 9.8 severity rating that enables complete site compromise through malicious plugin installation.
Technical ContextAI
The vulnerability stems from two distinct security flaws in the FunnelKit WordPress plugin's addon management system: (1) CWE-862 (Missing Authorization) - the install_or_activate_addon_plugins() function fails to validate user capabilities before processing plugin installation requests, and (2) weak nonce hash implementation that fails to provide adequate CSRF protection. WordPress plugins rely on the capabilities system (wp_current_user_can()) and cryptographic nonces to prevent unauthorized actions. The plugin's failure to implement these controls allows direct API/AJAX endpoint access without authentication. The affected product is specifically the 'Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit' plugin for WordPress, impacting all versions through 3.5.3. The vulnerability chain involves AJAX/REST endpoints exposed without authentication checks combined with insufficient request validation.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18629