{ "CVE_data_meta": { "ID": "CVE-2021-24171", "ASSIGNER": "contact@wpscan.com", "STATE": "PUBLIC", "TITLE": "WooCommerce Upload Files < 59.4 - Unauthenticated Arbitrary File Upload" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "generator": "WPScan CVE Generator", "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Unknown", "product": { "product_data": [ { "product_name": "WooCommerce Upload Files", "version": { "version_data": [ { "version_affected": "<", "version_name": "59.4", "version_value": "59.4" } ] } } ] } } ] } }, "description": { "description_data": [ { "lang": "eng", "value": "The WooCommerce Upload Files WordPress plugin before 59.4 ran a single sanitization pass to remove blocked extensions such as .php. It was possible to bypass this and upload a file with a PHP extension by embedding a \"blocked\" extension within another \"blocked\" extension in the \"wcuf_file_name\" parameter. It was also possible to perform a double extension attack and upload files to a different location via path traversal using the \"wcuf_current_upload_session_id\" parameter." } ] }, "references": { "reference_data": [ { "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/ed4288a1-f7e4-455f-b765-5ac343f87194", "name": "https://wpscan.com/vulnerability/ed4288a1-f7e4-455f-b765-5ac343f87194" }, { "refsource": "MISC", "url": "https://www.wordfence.com/blog/2021/03/critical-vulnerability-patched-in-woocommerce-upload-files/", "name": "https://www.wordfence.com/blog/2021/03/critical-vulnerability-patched-in-woocommerce-upload-files/" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "value": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "eng" } ] } ] }, "credit": [ { "lang": "eng", "value": "Ramuel Gall" } ], "source": { "discovery": "UNKNOWN" } }