CVE-2023-0080
📋 TL;DR
The Customer Reviews for WooCommerce WordPress plugin before version 5.16.0 contains a directory traversal vulnerability in a shortcode attribute. This allows authenticated users with contributor role or higher to read arbitrary files and potentially achieve remote code execution by uploading malicious images containing PHP code. The vulnerability affects WordPress sites using the vulnerable plugin version.
💻 Affected Systems
- Customer Reviews for WooCommerce WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete site compromise, data theft, and potential server takeover if malicious PHP files can be uploaded and included.
Likely Case
Unauthorized file disclosure including sensitive configuration files, database credentials, and other non-PHP files accessible to the web server.
If Mitigated
Limited impact if proper file upload restrictions and user role permissions are enforced, preventing malicious file uploads.
🎯 Exploit Status
Exploitation requires contributor-level access or higher. Attack chain involves directory traversal via shortcode attribute and potentially file upload for RCE.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.16.0
Vendor Advisory: https://wpscan.com/vulnerability/6b0d63ed-e244-4f20-8f10-a6e0c7ccadd4
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Customer Reviews for WooCommerce'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 5.16.0+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Restrict File Upload Capabilities
allLimit file upload permissions to prevent malicious image uploads containing PHP code.
Use WordPress role management plugins to remove upload_file capability from contributor and author roles
Disable Plugin
linuxTemporarily disable the vulnerable plugin until patched.
wp plugin deactivate customer-reviews-woocommerce
🧯 If You Can't Patch
- Implement strict file upload validation to block PHP code in image files
- Apply principle of least privilege by removing contributor and author roles or restricting their capabilities
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin under Plugins → Installed Plugins. If version is below 5.16.0, the site is vulnerable.
Check Version:
wp plugin get customer-reviews-woocommerce --field=version
Verify Fix Applied:
Confirm plugin version is 5.16.0 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns via shortcode parameters
- Multiple failed attempts to access sensitive files like wp-config.php
- Suspicious file uploads by contributor/author users
Network Indicators:
- HTTP requests containing directory traversal sequences in shortcode attributes
- Unusual file downloads from plugin directories
SIEM Query:
source="wordpress.log" AND ("..\/" OR "..\\" OR "%2e%2e%2f") AND "customer-reviews-woocommerce"