Impact
Unrestricted file upload in the garidium g-FFL Checkout plugin permits an attacker to upload any file, including malicious web shells, to the WordPress site. The presence of a web shell could enable the attacker to execute arbitrary code on the server.
Affected Systems
The garidium g-FFL Checkout plugin versions up to and including 2.1.0 are affected. Any WordPress installation running these versions is vulnerable.
Risk and Exploitability
This vulnerability is rated as CWE-434 and carries a CVSS score of 10.0, indicating critical severity. The EPSS score of less than 1 % suggests that public exploitation is uncommon, but the high severity keeps overall risk elevated. The vulnerability is not listed in the CISA KEV catalog. Attackers likely exploit the upload interface of the plugin; the exact attack prerequisites are not detailed, but interaction with the upload functionality is required.
OpenCVE Enrichment