CVE-2023-0080
CVSS V2 None
CVSS V3 None
Description
The Customer Reviews for WooCommerce WordPress plugin before 5.16.0 does not validate one of its shortcode attribute, which could allow users with a contributor role and above to include arbitrary files via a traversal attack. This could also allow them to read non PHP files and retrieve their content. RCE could also be achieved if the attacker manage to upload a malicious image containing PHP code, and then include it via the affected attribute, on a default WP install, authors could easily achieve that given that they have the upload_file capability.
Overview
- CVE ID
- CVE-2023-0080
- Assigner
- contact@wpscan.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-02-13T15:15:20
- Last Modified Date
- 2023-02-21T19:48:53
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:cusrev:customer_reviews_for_woocommerce:*:*:*:*:*:wordpress:*:* | 1 | OR | 5.16.0 |
References
Reference URL | Reference Tags |
---|---|
https://wpscan.com/vulnerability/6b0d63ed-e244-4f20-8f10-a6e0c7ccadd4 | Exploit Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-0080 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0080 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 07:37:39 | Added to TrackCVE | |||
2023-04-17 07:37:40 | Weakness Enumeration | new |