The Booster for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the validate_product_input_fields_on_add_to_cart function in versions 4.0.1 to 7.2.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
History

Wed, 09 Apr 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Booster
Booster booster For Woocommerce
CPEs cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:*:wordpress:*:*
Vendors & Products Booster
Booster booster For Woocommerce

Fri, 04 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 04 Apr 2025 04:30:00 +0000

Type Values Removed Values Added
Description The Booster for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the validate_product_input_fields_on_add_to_cart function in versions 4.0.1 to 7.2.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Title Booster for WooCommerce 4.0.1 - 7.2.4 - Unauthenticated Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-04-04T14:46:51.411Z

Reserved: 2025-01-27T18:04:36.322Z

Link: CVE-2024-13744

cve-icon Vulnrichment

Updated: 2025-04-04T14:26:44.944Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-04T05:15:44.350

Modified: 2025-04-09T18:09:50.180

Link: CVE-2024-13744

cve-icon Redhat

No data.