CSV Injection Vulnerability in Webtoffee Plugin for WordPress
CVE-2019-15092

7.3HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
23 August 2019

Summary

The Webtoffee plugin for WordPress allows malicious users to exploit a CSV injection vulnerability through the user_url, display_name, first_name, and last_name fields in exported CSV files. This issue arises when the WF_CustomerImpExpCsv_Exporter class generates CSV files, which can lead to malicious code execution in users' environments. Users and administrators should take immediate measures to update their installations to mitigate potential risks.

References

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.