First published: Sat Mar 08 2025(Updated: )
The Product Input Fields for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the add_product_input_fields_to_order_item_meta() function in all versions up to, and including, 1.12.0. This may make it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Please note that by default the plugin is only vulnerable to a double extension file upload attack, unless an administrators leaves the accepted file extensions field blank which can make .php file uploads possible. Please note 1.12.2 was mistakenly marked as patched while 1.12.1 was marked as vulnerable for a short period of time, this is not the case and 1.12.1 is fully patched.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WooCommerce Product Input Fields for WooCommerce | <=1.12.1 | |
Tyche Softwares Product Input Fields for WooCommerce | <1.12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13359 has a severity rating that indicates a critical risk due to the potential for arbitrary file uploads.
To fix CVE-2024-13359, update the Product Input Fields for WooCommerce plugin to version 1.12.2 or later where the vulnerability is addressed.
CVE-2024-13359 affects all versions of the Product Input Fields for WooCommerce plugin up to and including 1.12.1.
CVE-2024-13359 is classified as a vulnerability for arbitrary file uploads due to insufficient file type validation.
The CVE-2024-13359 vulnerability is associated with the Product Input Fields for WooCommerce plugin developed by WooCommerce.