Description
The FULL - Customer plugin for WordPress is vulnerable to Arbitrary File Upload via the /install-plugin REST route in versions up to, and including, 2.2.3 due to improper authorization. This allows authenticated attackers with subscriber-level permissions and above to execute code by installing plugins from arbitrary remote locations including non-repository sources onto the site, granted they are packaged as a valid WordPress plugin.
Scores
CVSS v3
8.8
EPSS
0.0096
EPSS Percentile
76.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
VulnCheck KEV
2023-08-08
CWE
CWE-285
CWE-434
Status
published
Products (2)
full/full_-_customer
< 2.2.3
fullservices/FULL – Cliente
< 2.2.3
Published
Aug 09, 2023
Tracked Since
Feb 18, 2026