Exploit Report

Computer Security And Bug Information

CVE-2024-3962

CVECVE-2024-3962
CVE Title
Published Date2024-04-26T09:15Z
Modified Date2024-04-26T12:58Z
DescriptionThe Product Addons & Fields for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ppom_upload_file function in all versions up to, and including, 32.0.18. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires the PPOM Pro plugin to be installed along with a WooCommerce product that contains a file upload field to retrieve the correct nonce.
References
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://www.wordfence.com/threat-intel/vulnerabilities/id/4f95bcc3-354e-4016-9a17-945569b076b6?source=cve
Reference Description https://www.wordfence.com/threat-intel/vulnerabilities/id/4f95bcc3-354e-4016-9a17-945569b076b6?source=cve
Reference URLhttps://themeisle.com/plugins/ppom-pro/
Reference Description https://themeisle.com/plugins/ppom-pro/
Reference URLhttps://plugins.trac.wordpress.org/changeset/3075669/woocommerce-product-addon
Reference Description https://plugins.trac.wordpress.org/changeset/3075669/woocommerce-product-addon
Sources NIST MITRE
Note
  • No CVSS data for this CVE

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles