Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2vp2-mmfj-gw73

Опубликовано: 16 янв. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.4

Описание

The Admin and Customer Messages After Order for WooCommerce: OrderConvo plugin for WordPress is vulnerable to limited file uploads due to insufficient file type validation in the upload_file() function in all versions up to, and including, 13.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload files on the affected site's server which may make remote code execution possible and is confirmed to make Cross-Site Scripting possible.

The Admin and Customer Messages After Order for WooCommerce: OrderConvo plugin for WordPress is vulnerable to limited file uploads due to insufficient file type validation in the upload_file() function in all versions up to, and including, 13.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload files on the affected site's server which may make remote code execution possible and is confirmed to make Cross-Site Scripting possible.

EPSS

Процентиль: 28%
0.001
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 5.4
nvd
около 1 года назад

The Admin and Customer Messages After Order for WooCommerce: OrderConvo plugin for WordPress is vulnerable to limited file uploads due to insufficient file type validation in the upload_file() function in all versions up to, and including, 13.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload files on the affected site's server which may make remote code execution possible and is confirmed to make Cross-Site Scripting possible.

EPSS

Процентиль: 28%
0.001
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-434