First published: Fri Apr 26 2024(Updated: )
The Product Addons & Fields for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ppom_upload_file function in all versions up to, and including, 32.0.18. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires the PPOM Pro plugin to be installed along with a WooCommerce product that contains a file upload field to retrieve the correct nonce.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Themeisle PPOM for WooCommerce | <32.0.19 | |
WordPress Addons & Fields for WooCommerce | <=32.0.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3962 is classified as a high severity vulnerability due to its potential for arbitrary file uploads.
To fix CVE-2024-3962, update the Product Addons & Fields for WooCommerce plugin to version 32.0.19 or later.
CVE-2024-3962 affects all versions of the Product Addons & Fields for WooCommerce plugin up to and including 32.0.18.
CVE-2024-3962 allows unauthenticated attackers to upload arbitrary files to the server.
No, CVE-2024-3962 can be exploited by unauthenticated users, making it especially dangerous.