First published: Mon Nov 04 2024(Updated: )
Unrestricted Upload of File with Dangerous Type vulnerability in Helloprint Plug your WooCommerce into the largest catalog of customized print products from Helloprint allows Upload a Web Shell to a Web Server.This issue affects Plug your WooCommerce into the largest catalog of customized print products from Helloprint: from n/a through 2.0.2.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Helloprint | <=2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50525 is classified as a high-severity vulnerability due to its potential to allow unrestricted file uploads, leading to remote code execution.
To fix CVE-2024-50525, update the Helloprint plugin to version 2.0.3 or later to mitigate the vulnerability.
CVE-2024-50525 enables attackers to upload web shell scripts to the server, leading to possible full server compromise.
If you are running any version of the Helloprint plugin prior to 2.0.3 on your WordPress site, you are vulnerable to CVE-2024-50525.
CVE-2024-50525 was disclosed in early 2024, emphasizing the need for prompt updates to vulnerable plugins.