Description
Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Using Malicious Files.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1.
Published: 2026-03-19
Score: 9 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an unrestricted file upload that allows an attacker to upload malicious files to the server. The affected plugin version does not validate the file type or enforce safe upload procedures, enabling potentially executable content such as PHP scripts to be placed on the webroot. If a PHP file is uploaded, the attacker can execute arbitrary code, leading to full compromise of the web application and underlying server. This weakness is identified as CWE-434: Unrestricted Upload of File with Dangerous Type.

Affected Systems

The flaw affects the Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture plugin in all releases from the initial version up to and including 2.0.3.1. Users of WordPress sites running any of these versions via the WooCommerce Wholesale Lead Capture plugin are at risk.

Risk and Exploitability

The injected vulnerability carries a CVSS base score of 9, indicating critical severity. EPSS and KEV data are unavailable, but the absence from the KEV catalog does not mitigate the risk. Attackers can exploit the flaw by sending a crafted HTTP request to the plugin’s upload endpoint—no special privileges are documented, so it is inferred that the attack vector is remote and may not require authentication. Once a malicious file is uploaded, executing it can allow attackers to gain remote code execution or further compromise the site. Given the high score and the potential for broad impact, immediate remediation is advised.

Generated by OpenCVE AI on March 19, 2026 at 07:21 UTC.

Remediation

Vendor Solution

Update the WordPress Woocommerce Wholesale Lead Capture plugin to the latest available version (at least 2.0.3.2).


OpenCVE Recommended Actions

  • Update the WordPress Woocommerce Wholesale Lead Capture plugin to at least version 2.0.3.2.

Generated by OpenCVE AI on March 19, 2026 at 07:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Rymera Web Co Pty Ltd.
Rymera Web Co Pty Ltd. woocommerce Wholesale Lead Capture
Wordpress
Wordpress wordpress
Vendors & Products Rymera Web Co Pty Ltd.
Rymera Web Co Pty Ltd. woocommerce Wholesale Lead Capture
Wordpress
Wordpress wordpress

Thu, 19 Mar 2026 06:00:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Using Malicious Files.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1.
Title WordPress Woocommerce Wholesale Lead Capture plugin <= 2.0.3.1 - Arbitrary File Upload vulnerability
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-03-19T13:47:39.369Z

Reserved: 2026-02-20T11:18:46.193Z

Link: CVE-2026-27540

cve-icon Vulnrichment

Updated: 2026-03-19T13:47:34.727Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-19T06:16:25.787

Modified: 2026-03-19T13:25:00.570

Link: CVE-2026-27540

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:55:21Z

Weaknesses