
Cloud Vulnerability DB
A community-led vulnerabilities database
The Product Addons & Fields for WooCommerce plugin for WordPress (CVE-2024-3962) contains a critical vulnerability related to arbitrary file uploads. The vulnerability exists in all versions up to and including 32.0.18, discovered and disclosed in April 2024. The issue affects WordPress installations with both the PPOM Pro plugin and WooCommerce products containing file upload fields (NVD).
The vulnerability stems from missing file type validation in the ppom_upload_file function, which allows unauthenticated attackers to upload arbitrary files to the affected site's server. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a highly severe security issue with network accessibility and no required privileges or user interaction (Wordfence).
The vulnerability can lead to remote code execution on the affected site's server if successfully exploited. This could potentially give attackers complete control over the affected WordPress installation, allowing them to execute arbitrary code, modify site content, or gain unauthorized access to sensitive information (NVD).
A patch has been released to address this vulnerability. Site administrators are strongly advised to update their Product Addons & Fields for WooCommerce plugin to version 32.0.19 or later. The fix includes proper file type validation in the affected function (WordPress Plugin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."