vulnerability

WordPress Plugin: woocommerce-follow-up-emails: CVE-2023-33318: Unrestricted Upload of File with Dangerous Type

Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
May 22, 2023
Added
May 15, 2025
Modified
May 15, 2025

Description

The WooCommerce Follow-Up Emails plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the template editing functionality in versions up to, and including, 4.9.40. This makes it possible for authenticated attackers, with Follow-Up Emails Manager permissions and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

Solution

woocommerce-follow-up-emails-plugin-cve-2023-33318
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.