CVE-2022-3537: CWE-434 Unrestricted Upload of File with Dangerous Type in Unknown Role Based Pricing for WooCommerce
The Role Based Pricing for WooCommerce WordPress plugin before 1.6.2 does not have authorisation and proper CSRF checks, and does not validate files to be uploaded, allowing any authenticated users like subscriber to upload arbitrary files, such as PHP
AI Analysis
Technical Summary
CVE-2022-3537 is a critical vulnerability identified in the Role Based Pricing for WooCommerce WordPress plugin, specifically affecting versions prior to 1.6.2. This vulnerability arises due to the plugin's failure to implement proper authorization controls and Cross-Site Request Forgery (CSRF) protections, combined with inadequate validation of uploaded files. As a result, any authenticated user with minimal privileges, such as a subscriber, can upload arbitrary files, including potentially malicious PHP scripts. This unrestricted file upload vulnerability (CWE-434) coupled with missing CSRF protections (CWE-352) allows attackers to execute remote code on the affected server, leading to full compromise of the WordPress site and potentially the underlying hosting environment. The CVSS v3.1 base score of 8.8 reflects the high impact and ease of exploitation, given that the attack requires only low privileges and no user interaction beyond authentication. Exploitation can lead to complete loss of confidentiality, integrity, and availability of the affected system, enabling attackers to deploy web shells, pivot within the network, steal sensitive data, or disrupt services. Although no known exploits are currently reported in the wild, the severity and straightforward exploitation path make this a significant threat to any WordPress site using this plugin without the latest security update.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on WooCommerce for e-commerce operations. Compromise of an e-commerce platform can lead to theft of customer data, including personal and payment information, violating GDPR and other data protection regulations, potentially resulting in heavy fines and reputational damage. Additionally, attackers gaining control over the web server can use it as a foothold to launch further attacks within the corporate network or distribute malware to customers. The disruption of e-commerce services can cause direct financial losses and degrade customer trust. Given the widespread use of WooCommerce across Europe, organizations ranging from small businesses to large retailers are at risk if they use the vulnerable plugin version. The lack of CSRF protection also increases the risk of automated or cross-site attacks, further amplifying the threat landscape.
Mitigation Recommendations
Organizations should immediately verify if they are using the Role Based Pricing for WooCommerce plugin and confirm the installed version. If the version is prior to 1.6.2, they must upgrade to the latest patched version without delay. In addition to patching, it is critical to audit user roles and permissions to ensure that only trusted users have upload capabilities. Implementing Web Application Firewalls (WAF) with rules to detect and block malicious file uploads can provide an additional layer of defense. Restricting file upload directories with proper permissions and disabling execution of uploaded files (e.g., via .htaccess or server configuration) can mitigate the impact if exploitation occurs. Regularly monitoring server logs for unusual file uploads or execution attempts is advised. Finally, organizations should conduct security awareness training for administrators and users to recognize suspicious activities and maintain a robust backup strategy to enable rapid recovery in case of compromise.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2022-3537: CWE-434 Unrestricted Upload of File with Dangerous Type in Unknown Role Based Pricing for WooCommerce
Description
The Role Based Pricing for WooCommerce WordPress plugin before 1.6.2 does not have authorisation and proper CSRF checks, and does not validate files to be uploaded, allowing any authenticated users like subscriber to upload arbitrary files, such as PHP
AI-Powered Analysis
Technical Analysis
CVE-2022-3537 is a critical vulnerability identified in the Role Based Pricing for WooCommerce WordPress plugin, specifically affecting versions prior to 1.6.2. This vulnerability arises due to the plugin's failure to implement proper authorization controls and Cross-Site Request Forgery (CSRF) protections, combined with inadequate validation of uploaded files. As a result, any authenticated user with minimal privileges, such as a subscriber, can upload arbitrary files, including potentially malicious PHP scripts. This unrestricted file upload vulnerability (CWE-434) coupled with missing CSRF protections (CWE-352) allows attackers to execute remote code on the affected server, leading to full compromise of the WordPress site and potentially the underlying hosting environment. The CVSS v3.1 base score of 8.8 reflects the high impact and ease of exploitation, given that the attack requires only low privileges and no user interaction beyond authentication. Exploitation can lead to complete loss of confidentiality, integrity, and availability of the affected system, enabling attackers to deploy web shells, pivot within the network, steal sensitive data, or disrupt services. Although no known exploits are currently reported in the wild, the severity and straightforward exploitation path make this a significant threat to any WordPress site using this plugin without the latest security update.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on WooCommerce for e-commerce operations. Compromise of an e-commerce platform can lead to theft of customer data, including personal and payment information, violating GDPR and other data protection regulations, potentially resulting in heavy fines and reputational damage. Additionally, attackers gaining control over the web server can use it as a foothold to launch further attacks within the corporate network or distribute malware to customers. The disruption of e-commerce services can cause direct financial losses and degrade customer trust. Given the widespread use of WooCommerce across Europe, organizations ranging from small businesses to large retailers are at risk if they use the vulnerable plugin version. The lack of CSRF protection also increases the risk of automated or cross-site attacks, further amplifying the threat landscape.
Mitigation Recommendations
Organizations should immediately verify if they are using the Role Based Pricing for WooCommerce plugin and confirm the installed version. If the version is prior to 1.6.2, they must upgrade to the latest patched version without delay. In addition to patching, it is critical to audit user roles and permissions to ensure that only trusted users have upload capabilities. Implementing Web Application Firewalls (WAF) with rules to detect and block malicious file uploads can provide an additional layer of defense. Restricting file upload directories with proper permissions and disabling execution of uploaded files (e.g., via .htaccess or server configuration) can mitigate the impact if exploitation occurs. Regularly monitoring server logs for unusual file uploads or execution attempts is advised. Finally, organizations should conduct security awareness training for administrators and users to recognize suspicious activities and maintain a robust backup strategy to enable rapid recovery in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-10-17T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9838c4522896dcbec4c2
Added to database: 5/21/2025, 9:09:12 AM
Last enriched: 7/2/2025, 1:10:11 AM
Last updated: 8/11/2025, 6:27:05 PM
Views: 12
Related Threats
CVE-2025-55164: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in helmetjs content-security-policy-parser
HighCVE-2025-3089: CWE-639 Authorization Bypass Through User-Controlled Key in ServiceNow ServiceNow AI Platform
MediumCVE-2025-54864: CWE-306: Missing Authentication for Critical Function in NixOS hydra
MediumCVE-2025-54800: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NixOS hydra
HighCVE-2025-8452: CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory in Brother Industries, Ltd HL-L8260CDN
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.