The Export and Import Users and Customers plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation on the 'upload_import_file' function in versions up to, and including, 2.4.8. This makes it possible for authenticated attackers with shop manager-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-02T08:35:14.475Z
Reserved: 2023-12-06T15:05:12.324Z
Link: CVE-2023-6558

No data.

Status : Modified
Published: 2024-01-11T09:15:49.037
Modified: 2024-11-21T08:44:05.787
Link: CVE-2023-6558

No data.