The Abandoned Cart Pro for WooCommerce plugin contains an authenticated arbitrary file upload vulnerability due to missing file type validation in the wcap_add_to_cart_popup_upload_files function in all versions up to, and including, 9.16.0. This makes it possible for an authenticated attacker, with subscriber-level access and above, to upload arbitrary files on the affected site's server which may allow for either remote or local code execution depending on the server configuration.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 10 Jun 2025 04:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Abandoned Cart Pro for WooCommerce plugin contains an authenticated arbitrary file upload vulnerability due to missing file type validation in the wcap_add_to_cart_popup_upload_files function in all versions up to, and including, 9.16.0. This makes it possible for an authenticated attacker, with subscriber-level access and above, to upload arbitrary files on the affected site's server which may allow for either remote or local code execution depending on the server configuration. | |
Title | Abandoned Cart Pro for WooCommerce <= 9.16.0 - Authenticated (Subscriber+) Arbitrary File Upload | |
Weaknesses | CWE-434 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-06-10T03:41:37.630Z
Updated: 2025-06-10T14:10:01.687Z
Reserved: 2025-05-06T17:02:27.568Z
Link: CVE-2025-4387

Updated: 2025-06-10T14:09:57.803Z

Status : Awaiting Analysis
Published: 2025-06-10T04:15:34.623
Modified: 2025-06-12T16:06:39.330
Link: CVE-2025-4387

No data.