WordPress Plugin Vulnerabilities
woocommerce-csvimport 3.3.6 – Authenticated Arbitrary File Deletion
Description
Type user access: any user registered.
$_POST['filename'] is not escaped.
Code
File: wp-content/plugins/woocommerce-csvimport/export/include/classes/woocsvExport.php Line:64
public function delete_export_file() {
if ( isset( $_POST['filename'] ) ) {
@unlink( $_POST['filename'] );
}
wp_die( 0 );
}
Result:
wp-config.php file deleted and restart the all system.
Proof of Concept
Affects Plugins
References
Miscellaneous
Submitter
Lenon Leite
Submitter website
Submitter twitter
Verified
No
WPVDB ID
Timeline
Publicly Published
2017-12-27 (about 8 years ago)
Added
2018-04-09 (about 8 years ago)
Last Updated
2019-11-01 (about 6 years ago)