An Arbitrary File Upload vulnerability has been identified in the WordPress My Account Page Editor for WooCommerce Plugin. This vulnerability allows an attacker to upload any type of file to the affected website, including malicious files that could be used to take control of the website.

This vulnerability was discovered and responsibly reported by Alexander Concha.

The vulnerability is an Arbitrary File Upload vulnerability that occurs in the my-account-page-editor.php file. The vulnerability allows an attacker to upload arbitrary files to the affected website by exploiting a flaw in the way that the plugin handles file uploads.

Severity:

The vulnerability has a CVSS 3.1 score of 9.9, which is considered to be critical. This means that the vulnerability is highly exploitable and could have a significant impact on the affected system.

Affected Versions:

The vulnerability affects all versions of the My Account Page Editor for WooCommerce Plugin prior to 1.3.2.

Impact:

An attacker who successfully exploits this vulnerability could:

  • Upload any type of file to the affected website, such as:
    • Backdoors
    • Viruses
    • Phishing scripts

These malicious files could then be executed by visitors to the website, potentially leading to a variety of security risks, such as:

  • Data theft
  • Website defacement
  • Denial of service attacks

Recommendation:

Given the critical nature of this vulnerability, immediate and decisive action is best:

  • Update Immediately: Users of the My Account Page Editor for WooCommerce Plugin are strongly advised to update to the latest available version (at least 1.3.2). This vulnerability has been fixed in version 1.3.2.
  • Regular Security Audits: Conduct regular and comprehensive security audits on the WordPress website.
  • Stay Informed: Keep an eye out for official updates or advisories related to the My Account Page Editor for WooCommerce Plugin.