CVE-2024-13342 (CNNVD-202508-3586)
中文标题:
WordPress plugin Booster for WooCommerce 代码问题漏洞
英文标题:
Booster for WooCommerce <= 7.2.4 - Unauthenticated Double Extension Arbitrary File Upload
漏洞描述
中文描述:
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Booster for WooCommerce 7.2.4及之前版本存在代码问题漏洞,该漏洞源于add_files_to_order函数缺少文件类型验证,可能导致任意文件上传和远程代码执行。
英文描述:
The Booster for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'add_files_to_order' function in all versions up to, and including, 7.2.4. This makes it possible for unauthenticated attackers to upload arbitrary files with double extensions on the affected site's server which may make remote code execution possible. This is only exploitable on select instances where the configuration will execute the first extension present.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| pluggabl | Booster for WooCommerce – PDF Invoices, Abandoned Cart, Variation Swatches & 100+ Tools | - | ≤ 7.2.4 | - |
cpe:2.3:a:pluggabl:booster_for_woocommerce_–_pdf_invoices,_abandoned_cart,_variation_swatches_&_100+_tools:*:*:*:*:*:*:*:*
|
| booster | booster_for_woocommerce | * | - | - |
cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:*:wordpress:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
HIGHCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2024-13342 |
2025-11-11 15:22:22 | 2025-11-11 07:39:00 |
| NVD | nvd_CVE-2024-13342 |
2025-11-11 15:00:21 | 2025-11-11 07:47:02 |
| CNNVD | cnnvd_CNNVD-202508-3586 |
2025-11-11 15:12:55 | 2025-11-11 08:00:08 |
版本与语言
安全公告
变更历史
查看详细变更
- affected_products_count: 1 -> 2
查看详细变更
- vulnerability_type: 未提取 -> 代码问题
- cnnvd_id: 未提取 -> CNNVD-202508-3586
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']