Arbitrary File Upload Vulnerability in FULL - Customer Plugin for WordPress
CVE-2023-4243
8.8HIGH
Summary
The FULL - Customer plugin for WordPress has a vulnerability that allows authenticated attackers with subscriber-level permissions to perform Arbitrary File Upload actions via the /install-plugin REST route. This occurs due to improper authorization mechanisms in place. Malicious users can exploit this vulnerability to install plugins from unauthorized sources onto a WordPress site. The risk is amplified as these plugins could potentially contain harmful code that disrupts the site's functionality and security.
Affected Version(s)
FULL – Customer * <= 2.2.3
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Ramuel Gall