Skip to main content

CVE-2024-22152: CWE-434 Unrestricted Upload of File with Dangerous Type in WebToffee Product Import Export for WooCommerce

High
VulnerabilityCVE-2024-22152cvecve-2024-22152cwe-434
Published: Wed Jan 24 2024 (01/24/2024, 11:48:56 UTC)
Source: CVE
Vendor/Project: WebToffee
Product: Product Import Export for WooCommerce

Description

Unrestricted Upload of File with Dangerous Type vulnerability in WebToffee Product Import Export for WooCommerce.This issue affects Product Import Export for WooCommerce: from n/a through 2.3.7.

AI-Powered Analysis

AILast updated: 07/08/2025, 21:57:13 UTC

Technical Analysis

CVE-2024-22152 is a high-severity vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability affects the WebToffee Product Import Export plugin for WooCommerce, specifically versions up to 2.3.7. The flaw allows an attacker with at least some level of privileges (PR:H) to upload files without proper validation or restriction on file types. The vulnerability is exploitable remotely over the network (AV:N), but requires high privileges and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially compromised component. The impact is critical across confidentiality, integrity, and availability (C:H/I:H/A:H), indicating that an attacker could potentially execute arbitrary code, access sensitive data, or disrupt service. Although no known exploits are currently reported in the wild, the vulnerability's nature and CVSS score of 8.0 highlight a significant risk. The absence of a patch link suggests that a fix may not yet be publicly available, increasing the urgency for mitigation. The vulnerability arises because the plugin does not properly restrict or sanitize uploaded files, enabling attackers to upload malicious files such as web shells or scripts that could be executed on the server. This can lead to full system compromise, data breaches, or service outages. Given WooCommerce's widespread use in e-commerce, this vulnerability poses a serious threat to online stores using this plugin.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WooCommerce with the WebToffee Product Import Export plugin, this vulnerability could lead to severe consequences. Attackers exploiting this flaw could gain unauthorized access to backend systems, manipulate product data, steal customer information including payment details, or deploy ransomware or other malware. This could result in financial losses, reputational damage, regulatory penalties under GDPR due to data breaches, and operational disruptions. The high integrity and availability impact means that attackers could alter product listings or disable the e-commerce site, directly affecting revenue streams. The confidentiality impact threatens customer trust and compliance with data protection laws. Given the critical role of e-commerce in European economies, the vulnerability could have cascading effects on supply chains and consumer confidence.

Mitigation Recommendations

Immediate mitigation steps include restricting file upload permissions to only trusted users and roles, and disabling the file upload feature in the plugin if not essential. Organizations should monitor and audit file uploads for suspicious activity and implement web application firewalls (WAF) with rules to detect and block malicious file uploads. Applying strict server-side validation to allow only safe file types and scanning uploaded files with antivirus solutions is critical. Until an official patch is released, consider isolating the affected plugin functionality or deploying the WooCommerce site in a hardened environment with minimal privileges. Regular backups and incident response plans should be updated to quickly recover from potential compromises. Additionally, organizations should track vendor communications for patches and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2024-01-05T11:18:25.468Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6830a0ae0acd01a249274156

Added to database: 5/23/2025, 4:22:06 PM

Last enriched: 7/8/2025, 9:57:13 PM

Last updated: 7/30/2025, 8:54:13 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats