Arbitrary File Inclusion Vulnerability in WPC Smart Messages for WooCommerce
CVE-2024-10436
8.8HIGH
Key Information:
- Vendor
- WPclever
- Status
- WPc Smart Messages For WooCommerce
- Vendor
- CVE Published:
- 29 October 2024
Summary
The WPC Smart Messages for WooCommerce plugin experiences a Local File Inclusion vulnerability in all versions up to and including 4.2.1. This issue arises through the get_condition_value function, allowing authenticated attackers with Subscriber-level access or greater to include and execute arbitrary files on the server. This exploit can facilitate the execution of any PHP code within those files, enabling attackers to bypass access controls, access sensitive information, or execute undesirable commands, particularly when handling file uploads deemed 'safe' like images.
Affected Version(s)
WPC Smart Messages for WooCommerce * <= 4.2.1
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
Youcef Hamdani