Automatic (minor version) patching for Unauthenticated SQL Injection in WooCommerce
Scheduled Maintenance Report for Pagely
Completed
The scheduled maintenance has been completed.
Posted Jul 17, 2021 - 19:45 UTC
In progress
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Posted Jul 15, 2021 - 19:45 UTC
Scheduled
An unauthenticated SQL Injection vulnerability affecting versions of WooCommerce on more than 5 million websites on the Internet has been disclosed to the public (https://woocommerce.com/posts/critical-vulnerability-detected-july-2021/) by Automattic.

Due to the nature of the vulnerability, the WooCommerce team is rolling out compulsory patching on minor versions -- even if the option "auto-updates" is disabled within WC or with Pagely.

**Details on the vulnerability.**

We won't provide specific details, but we can say that the function "wc_sanitize_taxonomy_name" allowed the vulnerability to happen due to the use of nested **urldecode** functions:
https://plugins.trac.wordpress.org/browser/woocommerce/trunk/includes/wc-formatting-functions.php?rev=2564657#L59

**Pagely Customers**

We have directly reached out to all of our clients who are using an affected version of WooCommerce. In case you did not receive that notification, please be aware that patches are being rolled out by the software vendor directly, not by Pagely. We are monitoring for problems on our end, and will conduct periodic scanning to confirm all sites hosted by Pagely are getting the update. If we see any issues affecting your site specifically, we will reach out with a Support Ticket.

If you manage your codebase using Git, please make sure the patched version makes it into your repository to prevent a regression during your next deployment.

**Conclusion**

While very rare, vulnerabilities of this severity require proactive action to keep you protected. This is the reason why WooCommerce decided to force minor versions updates. To be clear, even if you have requested Pagely to not apply automatic updates, this update coming from the vendor directly will still occur.

We wanted you to know that we are aware about this vulnerability. Since the very moment it was made public, we have been following along and making sure our customers are aware as well. If you have any questions please do not hesitate to contact our Support Team: https://support.pagely.com/hc/en-us/articles/114094215332-Contacting-Support
Posted Jul 15, 2021 - 19:44 UTC
This scheduled maintenance affected: VPS Hosting Infrastructure and Shared Hosting Infrastructure.