CVE-2022-3537: CWE-434 Unrestricted Upload of File with Dangerous Type in Unknown Role Based Pricing for WooCommerce
The Role Based Pricing for WooCommerce WordPress plugin before 1.6.2 does not have authorisation and proper CSRF checks, and does not validate files to be uploaded, allowing any authenticated users like subscriber to upload arbitrary files, such as PHP
AI Analysis
Technical Summary
CVE-2022-3537 is a critical vulnerability identified in the Role Based Pricing for WooCommerce WordPress plugin, specifically affecting versions prior to 1.6.2. This vulnerability arises due to the plugin's failure to implement proper authorization controls and Cross-Site Request Forgery (CSRF) protections, combined with inadequate validation of uploaded files. As a result, any authenticated user with minimal privileges, such as a subscriber, can upload arbitrary files, including potentially malicious PHP scripts. This unrestricted file upload vulnerability (CWE-434) coupled with missing CSRF protections (CWE-352) allows attackers to execute remote code on the affected server, leading to full compromise of the WordPress site and potentially the underlying hosting environment. The CVSS v3.1 base score of 8.8 reflects the high impact and ease of exploitation, given that the attack requires only low privileges and no user interaction beyond authentication. Exploitation can lead to complete loss of confidentiality, integrity, and availability of the affected system, enabling attackers to deploy web shells, pivot within the network, steal sensitive data, or disrupt services. Although no known exploits are currently reported in the wild, the severity and straightforward exploitation path make this a significant threat to any WordPress site using this plugin without the latest security update.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on WooCommerce for e-commerce operations. Compromise of an e-commerce platform can lead to theft of customer data, including personal and payment information, violating GDPR and other data protection regulations, potentially resulting in heavy fines and reputational damage. Additionally, attackers gaining control over the web server can use it as a foothold to launch further attacks within the corporate network or distribute malware to customers. The disruption of e-commerce services can cause direct financial losses and degrade customer trust. Given the widespread use of WooCommerce across Europe, organizations ranging from small businesses to large retailers are at risk if they use the vulnerable plugin version. The lack of CSRF protection also increases the risk of automated or cross-site attacks, further amplifying the threat landscape.
Mitigation Recommendations
Organizations should immediately verify if they are using the Role Based Pricing for WooCommerce plugin and confirm the installed version. If the version is prior to 1.6.2, they must upgrade to the latest patched version without delay. In addition to patching, it is critical to audit user roles and permissions to ensure that only trusted users have upload capabilities. Implementing Web Application Firewalls (WAF) with rules to detect and block malicious file uploads can provide an additional layer of defense. Restricting file upload directories with proper permissions and disabling execution of uploaded files (e.g., via .htaccess or server configuration) can mitigate the impact if exploitation occurs. Regularly monitoring server logs for unusual file uploads or execution attempts is advised. Finally, organizations should conduct security awareness training for administrators and users to recognize suspicious activities and maintain a robust backup strategy to enable rapid recovery in case of compromise.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Sweden
CVE-2022-3537: CWE-434 Unrestricted Upload of File with Dangerous Type in Unknown Role Based Pricing for WooCommerce
Description
The Role Based Pricing for WooCommerce WordPress plugin before 1.6.2 does not have authorisation and proper CSRF checks, and does not validate files to be uploaded, allowing any authenticated users like subscriber to upload arbitrary files, such as PHP
AI-Powered Analysis
Technical Analysis
CVE-2022-3537 is a critical vulnerability identified in the Role Based Pricing for WooCommerce WordPress plugin, specifically affecting versions prior to 1.6.2. This vulnerability arises due to the plugin's failure to implement proper authorization controls and Cross-Site Request Forgery (CSRF) protections, combined with inadequate validation of uploaded files. As a result, any authenticated user with minimal privileges, such as a subscriber, can upload arbitrary files, including potentially malicious PHP scripts. This unrestricted file upload vulnerability (CWE-434) coupled with missing CSRF protections (CWE-352) allows attackers to execute remote code on the affected server, leading to full compromise of the WordPress site and potentially the underlying hosting environment. The CVSS v3.1 base score of 8.8 reflects the high impact and ease of exploitation, given that the attack requires only low privileges and no user interaction beyond authentication. Exploitation can lead to complete loss of confidentiality, integrity, and availability of the affected system, enabling attackers to deploy web shells, pivot within the network, steal sensitive data, or disrupt services. Although no known exploits are currently reported in the wild, the severity and straightforward exploitation path make this a significant threat to any WordPress site using this plugin without the latest security update.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on WooCommerce for e-commerce operations. Compromise of an e-commerce platform can lead to theft of customer data, including personal and payment information, violating GDPR and other data protection regulations, potentially resulting in heavy fines and reputational damage. Additionally, attackers gaining control over the web server can use it as a foothold to launch further attacks within the corporate network or distribute malware to customers. The disruption of e-commerce services can cause direct financial losses and degrade customer trust. Given the widespread use of WooCommerce across Europe, organizations ranging from small businesses to large retailers are at risk if they use the vulnerable plugin version. The lack of CSRF protection also increases the risk of automated or cross-site attacks, further amplifying the threat landscape.
Mitigation Recommendations
Organizations should immediately verify if they are using the Role Based Pricing for WooCommerce plugin and confirm the installed version. If the version is prior to 1.6.2, they must upgrade to the latest patched version without delay. In addition to patching, it is critical to audit user roles and permissions to ensure that only trusted users have upload capabilities. Implementing Web Application Firewalls (WAF) with rules to detect and block malicious file uploads can provide an additional layer of defense. Restricting file upload directories with proper permissions and disabling execution of uploaded files (e.g., via .htaccess or server configuration) can mitigate the impact if exploitation occurs. Regularly monitoring server logs for unusual file uploads or execution attempts is advised. Finally, organizations should conduct security awareness training for administrators and users to recognize suspicious activities and maintain a robust backup strategy to enable rapid recovery in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-10-17T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9838c4522896dcbec4c2
Added to database: 5/21/2025, 9:09:12 AM
Last enriched: 7/2/2025, 1:10:11 AM
Last updated: 2/7/2026, 1:01:26 PM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.