Arbitrary File Inclusion Vulnerability in WPC Smart Messages for WooCommerce
CVE-2024-10436

8.8HIGH

Key Information:

Vendor
WPclever
Status
WPc Smart Messages For WooCommerce
Vendor
CVE Published:
29 October 2024

Summary

The WPC Smart Messages for WooCommerce plugin experiences a Local File Inclusion vulnerability in all versions up to and including 4.2.1. This issue arises through the get_condition_value function, allowing authenticated attackers with Subscriber-level access or greater to include and execute arbitrary files on the server. This exploit can facilitate the execution of any PHP code within those files, enabling attackers to bypass access controls, access sensitive information, or execute undesirable commands, particularly when handling file uploads deemed 'safe' like images.

Affected Version(s)

WPC Smart Messages for WooCommerce * <= 4.2.1

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database

Credit

Youcef Hamdani
.