CVE-2024-13744

HIGH

Booster For Woocommerce < 7.2.5 - Unrestricted File Upload

Title source: rule
STIX 2.1

Description

The Booster for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the validate_product_input_fields_on_add_to_cart function in versions 4.0.1 to 7.2.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

Scores

CVSS v3 8.1
EPSS 0.0158
EPSS Percentile 81.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-434
Status published
Products (1)
booster/booster_for_woocommerce 4.0.1 - 7.2.5
Published Apr 04, 2025
Tracked Since Feb 18, 2026