CVE-2024-1205

The Management App for WooCommerce – Order notifications, Order management, Lead management, Uptime Monitoring plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the nouvello_upload_csv_file function in all versions up to, and including, 1.2.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wemanage:wemanage:*:*:*:*:*:wordpress:*:*

History

09 Apr 2025, 15:37

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/wemanage-app-worker/trunk/includes/class-nouvello-wemanage-worker-api-wc-ext-controller-functions.php#L982 - () https://plugins.trac.wordpress.org/browser/wemanage-app-worker/trunk/includes/class-nouvello-wemanage-worker-api-wc-ext-controller-functions.php#L982 - Product
References () https://plugins.trac.wordpress.org/browser/wemanage-app-worker/trunk/includes/class-nouvello-wemanage-worker-api-wc-ext-controller.php#L166 - () https://plugins.trac.wordpress.org/browser/wemanage-app-worker/trunk/includes/class-nouvello-wemanage-worker-api-wc-ext-controller.php#L166 - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/a4219c10-9d2a-429d-9ac7-61efc02bd4cf?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/a4219c10-9d2a-429d-9ac7-61efc02bd4cf?source=cve - Third Party Advisory
First Time Wemanage
Wemanage wemanage
CWE CWE-434
CPE cpe:2.3:a:wemanage:wemanage:*:*:*:*:*:wordpress:*:*

Information

Published : 2024-03-20 07:15

Updated : 2025-04-09 15:37


NVD link : CVE-2024-1205

Mitre link : CVE-2024-1205

CVE.ORG link : CVE-2024-1205


JSON object : View

Products Affected

wemanage

  • wemanage
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type