The Customer Reviews for WooCommerce WordPress plugin before 5.16.0 does not validate one of its shortcode attribute, which could allow users with a contributor role and above to include arbitrary files via a traversal attack. This could also allow them to read non PHP files and retrieve their content. RCE could also be achieved if the attacker manage to upload a malicious image containing PHP code, and then include it via the affected attribute, on a default WP install, authors could easily achieve that given that they have the upload_file capability.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/6b0d63ed-e244-4f20-8f10-a6e0c7ccadd4 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/6b0d63ed-e244-4f20-8f10-a6e0c7ccadd4 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/6b0d63ed-e244-4f20-8f10-a6e0c7ccadd4 - Exploit, Third Party Advisory |
07 Nov 2023, 03:59
Type | Values Removed | Values Added |
---|---|---|
CWE |
Information
Published : 2023-02-13 15:15
Updated : 2024-11-21 07:36
NVD link : CVE-2023-0080
Mitre link : CVE-2023-0080
CVE.ORG link : CVE-2023-0080
JSON object : View
Products Affected
cusrev
- customer_reviews_for_woocommerce
CWE
No CWE.