// For flags

CVE-2024-13355

Admin and Customer Messages After Order for WooCommerce <= 13.2 - Authenticated (Subscriber+) Limited File Upload to Cross-Site Scripting

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

The Admin and Customer Messages After Order for WooCommerce: OrderConvo plugin for WordPress is vulnerable to limited file uploads due to insufficient file type validation in the upload_file() function in all versions up to, and including, 13.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload files on the affected site's server which may make remote code execution possible and is confirmed to make Cross-Site Scripting possible.

El complemento Admin and Customer Messages After Order for WooCommerce: OrderConvo para WordPress es vulnerable a la carga limitada de archivos debido a una validación insuficiente del tipo de archivo en la función upload_file() en todas las versiones hasta la 13.2 imcluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, carguen archivos en el servidor del sitio afectado, lo que puede hacer posible la ejecución remota de código y se ha confirmado que hace posible la ejecución de Cross-Site Scripting.

*Credits: AmrAwad
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2025-01-13 CVE Reserved
  • 2025-01-15 CVE Published
  • 2025-01-16 CVE Updated
  • 2025-01-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-434: Unrestricted Upload of File with Dangerous Type
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Nmedia
Search vendor "Nmedia"
Admin And Customer Messages After Order For WooCommerce OrderConvo
Search vendor "Nmedia" for product "Admin And Customer Messages After Order For WooCommerce OrderConvo"
<= 13.2
Search vendor "Nmedia" for product "Admin And Customer Messages After Order For WooCommerce OrderConvo" and version " <= 13.2"
en
Affected