The Booster for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the validate_product_input_fields_on_add_to_cart function in versions 4.0.1 to 7.2.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Apr 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Booster
Booster booster For Woocommerce |
|
CPEs | cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Booster
Booster booster For Woocommerce |
Fri, 04 Apr 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 04 Apr 2025 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Booster for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the validate_product_input_fields_on_add_to_cart function in versions 4.0.1 to 7.2.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. | |
Title | Booster for WooCommerce 4.0.1 - 7.2.4 - Unauthenticated Arbitrary File Upload | |
Weaknesses | CWE-434 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-04-04T14:46:51.411Z
Reserved: 2025-01-27T18:04:36.322Z
Link: CVE-2024-13744

Updated: 2025-04-04T14:26:44.944Z

Status : Analyzed
Published: 2025-04-04T05:15:44.350
Modified: 2025-04-09T18:09:50.180
Link: CVE-2024-13744

No data.