The Customer Reviews for WooCommerce WordPress plugin before 5.16.0 does not validate one of its shortcode attribute, which could allow users with a contributor role and above to include arbitrary files via a traversal attack. This could also allow them to read non PHP files and retrieve their content. RCE could also be achieved if the attacker manage to upload a malicious image containing PHP code, and then include it via the affected attribute, on a default WP install, authors could easily achieve that given that they have the upload_file capability.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-02T04:54:32.585Z
Reserved: 2023-01-05T08:30:50.719Z
Link: CVE-2023-0080

No data.

Status : Modified
Published: 2023-02-13T15:15:20.487
Modified: 2024-11-21T07:36:30.940
Link: CVE-2023-0080

No data.