High severity7.2NVD Advisory· Published Jan 11, 2024· Updated Apr 8, 2026
CVE-2023-6558
CVE-2023-6558
Description
The Export and Import Users and Customers plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation on the 'upload_import_file' function in versions up to, and including, 2.4.8. This makes it possible for authenticated attackers with shop manager-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Affected products
1- cpe:2.3:a:webtoffee:import_export_wordpress_users:*:*:*:*:*:wordpress:*:*Range: <=2.4.8
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- plugins.trac.wordpress.org/browser/users-customers-import-export-for-wp-woocommerce/tags/2.4.7/admin/modules/import/classes/class-import-ajax.phpnvdPatch
- plugins.trac.wordpress.org/changeset/3008454/users-customers-import-export-for-wp-woocommercenvdPatch
- www.wordfence.com/threat-intel/vulnerabilities/id/55b3e2dc-dc4f-408b-bbc6-da72ed5ad245nvdThird Party Advisory
News mentions
0No linked articles in our index yet.