CVE-2023-6090

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload arbitrary files to WooCommerce sites using the Mollie Payments plugin, potentially leading to remote code execution. It affects all WordPress sites running Mollie Payments for WooCommerce versions up to 7.3.11. Attackers could upload malicious files like PHP shells to gain control of the server.

💻 Affected Systems

Products:
  • Mollie Payments for WooCommerce
Versions: n/a through 7.3.11
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with the vulnerable plugin version installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise via remote code execution, allowing attackers to steal data, install malware, or pivot to other systems.

🟠

Likely Case

Website defacement, data theft, or installation of backdoors for persistent access.

🟢

If Mitigated

Limited impact if file uploads are restricted to authenticated users only and proper file type validation is in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and is straightforward with publicly available proof-of-concept code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.3.12 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/mollie-payments-for-woocommerce/wordpress-mollie-payments-for-woocommerce-plugin-7-3-11-arbitrary-file-upload-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Mollie Payments for WooCommerce'. 4. Click 'Update Now' if available, or manually update to version 7.3.12+. 5. Verify the plugin version after update.

🔧 Temporary Workarounds

Disable plugin

all

Temporarily disable the Mollie Payments plugin until patched.

wp plugin deactivate mollie-payments-for-woocommerce

Restrict file uploads via .htaccess

linux

Block execution of uploaded files in the uploads directory.

<FilesMatch "\.(php|php5|php7|phtml|phar)$">
  Order Allow,Deny
  Deny from all
</FilesMatch>

🧯 If You Can't Patch

  • Disable the Mollie Payments plugin immediately.
  • Implement web application firewall (WAF) rules to block file upload attempts to vulnerable endpoints.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins. If version is 7.3.11 or lower, it is vulnerable.

Check Version:

wp plugin get mollie-payments-for-woocommerce --field=version

Verify Fix Applied:

Verify the plugin version is 7.3.12 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /wp-content/uploads/mollie-payments-uploads/ or similar paths
  • POST requests to upload endpoints with PHP or executable file extensions

Network Indicators:

  • HTTP POST requests to upload-related endpoints with suspicious file types

SIEM Query:

source="web_logs" AND (uri_path="/wp-content/plugins/mollie-payments-for-woocommerce/*upload*" OR uri_path="/wp-admin/admin-ajax.php") AND (file_extension="php" OR file_extension="phtml" OR file_extension="phar")

🔗 References

📤 Share & Export