Arbitrary File Upload Vulnerability in Product Input Fields for WooCommerce by WordPress
CVE-2024-13359

8.1HIGH

Key Information:

Vendor
WordPress
Vendor
CVE Published:
8 March 2025

Summary

The Product Input Fields for WooCommerce plugin for WordPress is susceptible to arbitrary file uploads due to inadequate validation of file types in the add_product_input_fields_to_order_item_meta() function. This vulnerability exists in all versions up to and including 1.12.1. An unauthenticated attacker could exploit this flaw to upload unauthorized files to the server. By default, this vulnerability is primarily associated with double extension file upload attacks. However, if the field that restricts accepted file extensions is left empty by an administrator, it may allow .php files to be uploaded, enabling potential remote code execution.

Affected Version(s)

Product Input Fields for WooCommerce * <= 1.12.1

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

lucky_buddy
.