Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27540: CWE-434 Unrestricted Upload of File with Dangerous Type in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture

0
Critical
VulnerabilityCVE-2026-27540cvecve-2026-27540cwe-434
Published: Thu Mar 19 2026 (03/19/2026, 05:24:45 UTC)
Source: CVE Database V5
Vendor/Project: Rymera Web Co Pty Ltd.
Product: Woocommerce Wholesale Lead Capture

Description

CVE-2026-27540 is a critical vulnerability in the Woocommerce Wholesale Lead Capture plugin by Rymera Web Co Pty Ltd that allows unrestricted upload of files with dangerous types. This flaw enables attackers to upload malicious files without authentication or user interaction, potentially leading to full system compromise. The vulnerability affects versions up to 2. 0. 3. 1 and has a CVSS score of 9. 0, indicating high impact on confidentiality, integrity, and availability. Exploitation requires network access but no privileges, and the scope is changed due to potential compromise beyond the plugin. No known exploits are currently in the wild. Organizations using this plugin on WordPress e-commerce sites are at significant risk.

AI-Powered Analysis

AILast updated: 03/19/2026, 06:08:58 UTC

Technical Analysis

The vulnerability identified as CVE-2026-27540 affects the Woocommerce Wholesale Lead Capture plugin developed by Rymera Web Co Pty Ltd. It is classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This security flaw allows an unauthenticated remote attacker to upload arbitrary files, including potentially malicious scripts, to the server hosting the plugin. The lack of proper validation or restriction on file types means that attackers can bypass security controls and place executable files on the server. Given the plugin’s role in capturing wholesale leads for WooCommerce, a popular e-commerce platform on WordPress, this vulnerability exposes a critical attack vector. The CVSS v3.1 score of 9.0 reflects a critical severity, with network attack vector, high attack complexity, no privileges required, no user interaction, and a scope change indicating that the impact extends beyond the vulnerable component. Successful exploitation can lead to remote code execution, full system compromise, data theft, and disruption of e-commerce operations. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make this a high-priority issue for affected users. The vulnerability affects all versions up to 2.0.3.1, and no official patches are currently linked, emphasizing the need for immediate mitigation.

Potential Impact

The impact of CVE-2026-27540 is severe for organizations using the Woocommerce Wholesale Lead Capture plugin. Attackers can upload malicious files remotely without authentication, potentially leading to remote code execution on the web server. This can result in complete compromise of the affected system, including unauthorized access to sensitive customer and business data, defacement of websites, insertion of malware or backdoors, and disruption of e-commerce services. The integrity and availability of the affected systems are at high risk, which can damage business reputation and cause financial losses. Given WooCommerce’s widespread use in online retail, exploitation could affect a large number of small to medium-sized businesses globally. The vulnerability also increases the attack surface for further lateral movement within corporate networks if the compromised server is connected internally. The lack of user interaction and privileges required makes this vulnerability particularly dangerous and easy to exploit by remote attackers.

Mitigation Recommendations

To mitigate CVE-2026-27540, organizations should immediately audit their WordPress installations for the presence of the Woocommerce Wholesale Lead Capture plugin and verify the version in use. If the plugin is installed and running a vulnerable version (up to 2.0.3.1), it is critical to disable or remove the plugin until a security patch is released. In the absence of an official patch, implement strict web application firewall (WAF) rules to block file uploads or restrict upload functionality to trusted users only. Additionally, configure server-side controls to validate and restrict allowed file types rigorously, preventing execution of uploaded files. Employ least privilege principles on the web server to limit the impact of any successful upload. Regularly monitor server logs for suspicious upload attempts and unusual file creations. Organizations should also ensure that backups are current and tested to enable recovery in case of compromise. Finally, maintain awareness of vendor advisories for any forthcoming patches and apply them promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-02-20T11:18:46.193Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bb8f8fe32a4fbe5f949e67

Added to database: 3/19/2026, 5:54:23 AM

Last enriched: 3/19/2026, 6:08:58 AM

Last updated: 3/19/2026, 8:19:17 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses