CSV Injection Vulnerability in Webtoffee Plugin for WordPress
CVE-2019-15092

7.3HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
23 August 2019

Summary

The Webtoffee plugin for WordPress allows malicious users to exploit a CSV injection vulnerability through the user_url, display_name, first_name, and last_name fields in exported CSV files. This issue arises when the WF_CustomerImpExpCsv_Exporter class generates CSV files, which can lead to malicious code execution in users' environments. Users and administrators should take immediate measures to update their installations to mitigate potential risks.

References

EPSS Score

8% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.