The Customer Reviews for WooCommerce WordPress plugin before 5.16.0 does not validate one of its shortcode attribute, which could allow users with a contributor role and above to include arbitrary files via a traversal attack. This could also allow them to read non PHP files and retrieve their content. RCE could also be achieved if the attacker manage to upload a malicious image containing PHP code, and then include it via the affected attribute, on a default WP install, authors could easily achieve that given that they have the upload_file capability.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/6b0d63ed-e244-4f20-8f10-a6e0c7ccadd4 | Exploit Third Party Advisory |
Configurations
Information
Published : 2023-02-13 07:15
Updated : 2023-02-21 11:48
NVD link : CVE-2023-0080
Mitre link : CVE-2023-0080
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
cusrev
- customer_reviews_for_woocommerce