Skip to main content

CVE-2022-3537: CWE-434 Unrestricted Upload of File with Dangerous Type in Unknown Role Based Pricing for WooCommerce

Low
VulnerabilityCVE-2022-3537cvecve-2022-3537cwe-434cwe-352
Published: Mon Nov 07 2022 (11/07/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Role Based Pricing for WooCommerce

Description

The Role Based Pricing for WooCommerce WordPress plugin before 1.6.2 does not have authorisation and proper CSRF checks, and does not validate files to be uploaded, allowing any authenticated users like subscriber to upload arbitrary files, such as PHP

AI-Powered Analysis

AILast updated: 07/02/2025, 01:10:11 UTC

Technical Analysis

CVE-2022-3537 is a critical vulnerability identified in the Role Based Pricing for WooCommerce WordPress plugin, specifically affecting versions prior to 1.6.2. This vulnerability arises due to the plugin's failure to implement proper authorization controls and Cross-Site Request Forgery (CSRF) protections, combined with inadequate validation of uploaded files. As a result, any authenticated user with minimal privileges, such as a subscriber, can upload arbitrary files, including potentially malicious PHP scripts. This unrestricted file upload vulnerability (CWE-434) coupled with missing CSRF protections (CWE-352) allows attackers to execute remote code on the affected server, leading to full compromise of the WordPress site and potentially the underlying hosting environment. The CVSS v3.1 base score of 8.8 reflects the high impact and ease of exploitation, given that the attack requires only low privileges and no user interaction beyond authentication. Exploitation can lead to complete loss of confidentiality, integrity, and availability of the affected system, enabling attackers to deploy web shells, pivot within the network, steal sensitive data, or disrupt services. Although no known exploits are currently reported in the wild, the severity and straightforward exploitation path make this a significant threat to any WordPress site using this plugin without the latest security update.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for those relying on WooCommerce for e-commerce operations. Compromise of an e-commerce platform can lead to theft of customer data, including personal and payment information, violating GDPR and other data protection regulations, potentially resulting in heavy fines and reputational damage. Additionally, attackers gaining control over the web server can use it as a foothold to launch further attacks within the corporate network or distribute malware to customers. The disruption of e-commerce services can cause direct financial losses and degrade customer trust. Given the widespread use of WooCommerce across Europe, organizations ranging from small businesses to large retailers are at risk if they use the vulnerable plugin version. The lack of CSRF protection also increases the risk of automated or cross-site attacks, further amplifying the threat landscape.

Mitigation Recommendations

Organizations should immediately verify if they are using the Role Based Pricing for WooCommerce plugin and confirm the installed version. If the version is prior to 1.6.2, they must upgrade to the latest patched version without delay. In addition to patching, it is critical to audit user roles and permissions to ensure that only trusted users have upload capabilities. Implementing Web Application Firewalls (WAF) with rules to detect and block malicious file uploads can provide an additional layer of defense. Restricting file upload directories with proper permissions and disabling execution of uploaded files (e.g., via .htaccess or server configuration) can mitigate the impact if exploitation occurs. Regularly monitoring server logs for unusual file uploads or execution attempts is advised. Finally, organizations should conduct security awareness training for administrators and users to recognize suspicious activities and maintain a robust backup strategy to enable rapid recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec4c2

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 7/2/2025, 1:10:11 AM

Last updated: 8/11/2025, 6:27:05 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats