The SMSA Shipping(official) plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the smsa_delete_label() function in all versions up to, and including, 2.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Metrics
Affected Vendors & Products
References
History
Sat, 21 Dec 2024 07:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The SMSA Shipping(official) plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the smsa_delete_label() function in all versions up to, and including, 2.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). | |
Title | SMSA Shipping(official) <= 2.2 - Authenticated (Subscriber+) Arbitrary File Deletion | |
Weaknesses | CWE-73 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-12-21T07:02:59.004Z
Updated: 2024-12-21T07:02:59.004Z
Reserved: 2024-12-02T21:25:42.797Z
Link: CVE-2024-12066
Vulnrichment
No data.
NVD
Status : Received
Published: 2024-12-21T07:15:08.907
Modified: 2024-12-21T07:15:08.907
Link: CVE-2024-12066
Redhat
No data.