TROYANOSYVIRUS
Back to CVEs

CVE-2023-6979

HIGH
8.8

Description

The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ivole_import_upload_csv AJAX action in all versions up to, and including, 5.38.9. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

CVE Details

CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published1/11/2024
Last Modified4/8/2026
Sourcenvd
Honeypot Sightings0

Affected Products

cusrev:customer_reviews_for_woocommerce

Weaknesses (CWE)

CWE-434CWE-434

References

https://drive.proton.me/urls/K4R2HDQBS0#iuTPm3NqZEdz(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.