First published: Thu Jan 11 2024(Updated: )
The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ivole_import_upload_csv AJAX action in all versions up to, and including, 5.38.9. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WP Customer Reviews | <=5.38.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6979 is considered a high severity vulnerability due to the potential for arbitrary file uploads.
To fix CVE-2023-6979, update the Customer Reviews for WooCommerce plugin to the latest version beyond 5.38.9.
Authenticated users with author-level access on WordPress sites using versions of the plugin up to and including 5.38.9 are affected by CVE-2023-6979.
CVE-2023-6979 can facilitate attacks that allow unauthorized file uploads, potentially leading to code execution or further exploitation.
All versions of the Customer Reviews for WooCommerce plugin up to and including 5.38.9 are vulnerable to CVE-2023-6979.