Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total2
Critical2
High0
Medium0
Reset
Showing 1-2 of 2 records
Threat Entry Updated 2024-11-19

CVE-2024-10820 - Woocommerce Upload Files Plugin

The WooCommerce Upload Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload_files() function in all versions up to, and including, 84.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Woocommerce Upload Files

CVE-2024-10820

CRITICAL CVSS 9.8 2024-11-13
Threat Entry Updated 2024-11-25

CVE-2021-24171 - Woocommerce Upload Files Plugin

The WooCommerce Upload Files WordPress plugin before 59.4 ran a single sanitization pass to remove blocked extensions such as .php. It was possible to bypass this and upload a file with a PHP extension by embedding a "blocked" extension within another "blocked" extension in the "wcuf_file_name" parameter. It was also possible to perform a double extension attack and upload files to a different location via path traversal using the "wcuf_current_upload_session_id" parameter.

PLUGIN Woocommerce Upload Files

CVE-2021-24171

CRITICAL CVSS 9.8 2021-04-05
Scroll to top