
Cloud Vulnerability DB
A community-led vulnerabilities database
The Membership For WooCommerce WordPress plugin before version 2.1.7 contains a critical security vulnerability identified as CVE-2022-4395. The vulnerability was discovered and publicly disclosed on January 4, 2023. This security flaw affects the file upload functionality in the plugin, which fails to properly validate uploaded files (WPScan).
The vulnerability stems from improper file validation in the plugin's upload functionality. Specifically, the issue exists in the file upload endpoint at '/wp-admin/admin-ajax.php' with the action parameter 'wpsmembershipcsvfileupload'. The vulnerability has been assigned a CVSS v3.1 Base Score of 9.8 (CRITICAL), with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a critical severity level with network accessibility and no required privileges or user interaction (NVD).
The vulnerability allows unauthenticated attackers to upload arbitrary files, including malicious PHP code, to the server. This can lead to Remote Code Execution (RCE) on the affected WordPress installation. Successful exploitation gives attackers complete control over the vulnerable website (WPScan).
The vulnerability has been fixed in version 2.1.7 of the Membership For WooCommerce plugin. Website administrators are strongly advised to update to this version or later to protect against potential attacks. If immediate updating is not possible, it is recommended to disable the plugin until the update can be applied (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."