Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 22 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 21 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Woocommerce
Woocommerce woocommerce Wordpress Wordpress wordpress |
|
| Vendors & Products |
Woocommerce
Woocommerce woocommerce Wordpress Wordpress wordpress |
Sat, 20 Dec 2025 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The File Uploader for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the callback function for the 'add-image-data' REST API endpoint in all versions up to, and including, 1.0.3. This makes it possible for unauthenticated attackers to upload arbitrary files to the Uploadcare service and subsequently download them on the affected site's server which may make remote code execution possible. | |
| Title | File Uploader for WooCommerce <= 1.0.3 - Unauthenticated Arbitrary File Upload via add-image-data | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-12-22T20:30:31.285Z
Reserved: 2025-11-17T18:50:29.412Z
Link: CVE-2025-13329
Updated: 2025-12-22T20:30:28.207Z
Status : Awaiting Analysis
Published: 2025-12-20T04:16:07.207
Modified: 2025-12-23T14:51:52.650
Link: CVE-2025-13329
No data.
OpenCVE Enrichment
Updated: 2025-12-21T21:12:32Z