The Welcart e-Commerce WordPress plugin before 2.9.5 does not validate files to be uploaded, as well as does not have authorisation and CSRF in an AJAX action handling such upload. As a result, any authenticated users, such as subscriber could upload arbitrary files, such as PHP on the server
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/6d29ba12-f14a-4cee-baae-a6049d83bce6 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/6d29ba12-f14a-4cee-baae-a6049d83bce6 | Exploit Third Party Advisory |
Configurations
History
20 Feb 2025, 18:34
Type | Values Removed | Values Added |
---|---|---|
First Time |
Welcart
Welcart welcart E-commerce |
|
CPE | cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:* |
Information
Published : 2023-12-04 22:15
Updated : 2025-02-20 18:34
NVD link : CVE-2023-5953
Mitre link : CVE-2023-5953
CVE.ORG link : CVE-2023-5953
JSON object : View
Products Affected
welcart
- welcart_e-commerce
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type