Lucene search

K
wpvulndbWpvulndbWPVDB-ID:725213E5-39F2-446C-B8D5-047E10D8EC7A
HistoryJun 11, 2024 - 12:00 a.m.

Checkout Field Editor for WooCommerce (Pro) < 3.6.3 - Unauthenticated Arbitrary File Deletion

2024-06-1100:00:00
wpscan.com
4
woocommerce
wordpress
plugin
vulnerability
arbitrary file deletion
remote code execution

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

7.5 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.1%

Description The Checkout Field Editor for WooCommerce (Pro) plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 3.6.2. This is due to the plugin not properly validating a file or it’s path prior to deleting it. This makes it possible for unauthenticated attackers to delete arbitrary files which can be leveraged to achieve remote code execution.

CPENameOperatorVersion
eq3.6.3

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

7.5 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.1%

Related for WPVDB-ID:725213E5-39F2-446C-B8D5-047E10D8EC7A