The Customer Email Verification for WooCommerce plugin for WordPress is vulnerable to Email Verification and Authentication Bypass in all versions up to, and including, 2.7.4 via the use of insufficiently random activation code. This makes it possible for unauthenticated attackers to bypass the email verification, and if both the "Login the user automatically after the account is verified" and "Verify account for current users" options are checked, then it potentially makes it possible for attackers to bypass authentication for other users.

Project Subscriptions

No data.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-32741 The Customer Email Verification for WooCommerce plugin for WordPress is vulnerable to Email Verification and Authentication Bypass in all versions up to, and including, 2.7.4 via the use of insufficiently random activation code. This makes it possible for unauthenticated attackers to bypass the email verification, and if both the "Login the user automatically after the account is verified" and "Verify account for current users" options are checked, then it potentially makes it possible for attackers to bypass authentication for other users.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Title Customer Email Verification for WooCommerce <= 2.7.4 - Email Verification and Authentication Bypass due to Insufficient Randomness
Weaknesses CWE-330

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:31:15.707Z

Reserved: 2024-04-25T14:28:40.021Z

Link: CVE-2024-4185

cve-icon Vulnrichment

Updated: 2024-08-01T20:33:52.503Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-30T09:15:07.463

Modified: 2026-04-08T19:21:33.370

Link: CVE-2024-4185

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses