CSV Injection Vulnerability in Webtoffee Plugin for WordPress
CVE-2019-15092
7.3HIGH
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 23 August 2019
Summary
The Webtoffee plugin for WordPress allows malicious users to exploit a CSV injection vulnerability through the user_url, display_name, first_name, and last_name fields in exported CSV files. This issue arises when the WF_CustomerImpExpCsv_Exporter class generates CSV files, which can lead to malicious code execution in users' environments. Users and administrators should take immediate measures to update their installations to mitigate potential risks.
References
CVSS V3.1
Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved