Arbitrary File Upload Vulnerability in Product Input Fields for WooCommerce by WordPress
CVE-2024-13359
8.1HIGH
Key Information:
- Vendor
- WordPress
- Vendor
- CVE Published:
- 8 March 2025
Summary
The Product Input Fields for WooCommerce plugin for WordPress is susceptible to arbitrary file uploads due to inadequate validation of file types in the add_product_input_fields_to_order_item_meta() function. This vulnerability exists in all versions up to and including 1.12.1. An unauthenticated attacker could exploit this flaw to upload unauthorized files to the server. By default, this vulnerability is primarily associated with double extension file upload attacks. However, if the field that restricts accepted file extensions is left empty by an administrator, it may allow .php files to be uploaded, enabling potential remote code execution.
Affected Version(s)
Product Input Fields for WooCommerce * <= 1.12.1
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
lucky_buddy