CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
52.6%
The Product Input Fields for WooCommerce plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the handle_downloads() function in versions up to, and including, 1.2.6. This makes it possible for unauthenticated attackers to download files from the vulnerable service.
Vendor | Product | Version | CPE |
---|---|---|---|
tychesoftwares | product_input_fields_for_woocommerce | * | cpe:2.3:a:tychesoftwares:product_input_fields_for_woocommerce:*:*:*:*:*:wordpress:*:* |
[
{
"vendor": "tychesoftwares",
"product": "Product Input Fields for WooCommerce",
"versions": [
{
"version": "*",
"status": "affected",
"lessThanOrEqual": "1.2.6",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
]
blog.nintechnet.com/high-severity-vulnerability-fixed-in-product-input-fields-for-woocommerce/
plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2349889%40product-input-fields-for-woocommerce&new=2349889%40product-input-fields-for-woocommerce&sfp_email=&sfph_mail=
wpscan.com/vulnerability/15f345e6-fc53-4bac-bc5a-de898181ea74
www.wordfence.com/threat-intel/vulnerabilities/id/01e41573-9329-48e1-9191-e8e1532f7afc?source=cve