Intrusion Prevention

WordPress.WooCommerce.Checkout.Manager.Arbitrary.File.Upload

Description

This indicates an attack attempt against an Arbitrary File Upload vulnerability in WordPress WooCommerce Checkout Manager Plugin.
The vulnerability is due to insufficient sanitizing of user supplied inputs when handling a crafted file upload. It allows a remote attacker to upload an arbitrary file onto vulnerable systems via a crafted HTTP request.

Affected Products

WordPress WooCommerce Checkout Manager Plugin 4.2.6 and prior

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
https://wordpress.org/plugins/woocommerce-checkout-manager/

Other References

9262