vulnerability
WordPress Plugin: woocommerce-follow-up-emails: CVE-2023-33318: Unrestricted Upload of File with Dangerous Type
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:L/Au:S/C:C/I:C/A:C) | May 22, 2023 | May 15, 2025 | May 15, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
May 22, 2023
Added
May 15, 2025
Modified
May 15, 2025
Description
The WooCommerce Follow-Up Emails plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the template editing functionality in versions up to, and including, 4.9.40. This makes it possible for authenticated attackers, with Follow-Up Emails Manager permissions and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Solution
woocommerce-follow-up-emails-plugin-cve-2023-33318

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.