cve/2023/CVE-2023-4821.md
2024-05-28 08:49:17 +00:00

18 lines
834 B
Markdown

### [CVE-2023-4821](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4821)
![](https://img.shields.io/static/v1?label=Product&message=Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20WooCommerce&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.1.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Drag and Drop Multiple File Upload for WooCommerce WordPress plugin before 1.1.1 does not filter all potentially dangerous file extensions. Therefore, an attacker can upload unsafe .shtml or .svg files containing malicious scripts.
### POC
#### Reference
- https://wpscan.com/vulnerability/3ac0853b-03f7-44b9-aa9b-72df3e01a9b5
#### Github
No PoCs found on GitHub currently.