Description
Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture woocommerce-wholesale-lead-capture allows Using Malicious Files.This issue affects Woocommerce Wholesale Lead Capture: from n/a through <= 2.0.3.1.
Published: 2026-03-19
Score: 9 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The weakness is an unrestricted file upload that accepts any file type without validation. A malicious actor can upload files with dangerous extensions or executable payloads to the WordPress site through the Woocommerce Wholesale Lead Capture plugin. Based on the description, it is inferred that if the server permits execution of those files in the upload location, the attacker could run arbitrary PHP or other code, effectively gaining control over the application layer. The flaw is categorized as CWE‑434, Unrestricted Upload of File with Dangerous Type.

Affected Systems

The vulnerability affects the Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture plugin in all releases from the first version through and including 2.0.3.1. WordPress sites that have installed any of these plugin versions are at risk.

Risk and Exploitability

The CVSS score is 9, indicating high severity, and the EPSS score is below 1%, indicating low overall attack probability. The vulnerability is not listed in the CISA KEV catalog. The description does not mention authentication requirements; therefore it is inferred that the upload endpoint may be reachable by an unauthenticated user. An attacker could send a crafted HTTP request to the plugin’s upload endpoint to place a malicious file in the webroot. Based on the description, it is inferred that if the server allows execution of uploaded files, the attacker could obtain remote code execution or further compromise the site.

Generated by OpenCVE AI on April 29, 2026 at 12:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Woocommerce Wholesale Lead Capture plugin to a version newer than 2.0.3.1 once a patch is released.
  • If a patch is unavailable, disable or delete the plugin to prevent the upload path from being exposed.
  • Configure the web server to block execution of PHP or other executable files in the upload directory, for example by adding a .htaccess rule that denies execution.

Generated by OpenCVE AI on April 29, 2026 at 12:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Thu, 23 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
References
Metrics cvssV3_1

{'score': 9.0, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Using Malicious Files.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1. Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture woocommerce-wholesale-lead-capture allows Using Malicious Files.This issue affects Woocommerce Wholesale Lead Capture: from n/a through <= 2.0.3.1.
References

Thu, 19 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Rymera Web Co Pty Ltd.
Rymera Web Co Pty Ltd. woocommerce Wholesale Lead Capture
Wordpress
Wordpress wordpress
Vendors & Products Rymera Web Co Pty Ltd.
Rymera Web Co Pty Ltd. woocommerce Wholesale Lead Capture
Wordpress
Wordpress wordpress

Thu, 19 Mar 2026 06:00:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Using Malicious Files.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1.
Title WordPress Woocommerce Wholesale Lead Capture plugin <= 2.0.3.1 - Arbitrary File Upload vulnerability
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-29T09:51:57.128Z

Reserved: 2026-02-20T11:18:46.193Z

Link: CVE-2026-27540

cve-icon Vulnrichment

Updated: 2026-03-19T13:47:34.727Z

cve-icon NVD

Status : Deferred

Published: 2026-03-19T06:16:25.787

Modified: 2026-04-29T10:16:55.783

Link: CVE-2026-27540

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T13:00:06Z

Weaknesses