This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Unauthenticated Arbitrary File Upload in StoreKeeper for WooCommerce. <br>π₯ **Consequences**: Attackers upload malicious files (e.g., webshells), leading to **Remote Code Execution (RCE)**.β¦
π‘οΈ **Root Cause**: **CWE-434** (Unrestricted Upload of File with Dangerous Type). <br>β **Flaw**: Missing file type validation in the upload handler. The plugin accepts dangerous extensions without checking.
Q3Who is affected? (Versions/Components)
π¦ **Affected**: **StoreKeeper for WooCommerce** plugin. <br>π **Versions**: **14.4.4 and earlier**. <br>π’ **Vendor**: StoreKeeper B.V. (WordPress Plugin).
Q4What can hackers do? (Privileges/Data)
π **Privileges**: **Unauthenticated** access required. <br>π **Data**: Full server control. Attackers can execute arbitrary code, steal data, or pivot to other systems. CVSS Impact: **Critical (9.8)**.
π£ **Public Exp?**: **YES**. <br>π **PoC**: Available on GitHub (Nxploited/CVE-2025-48148). <br>π **Wild Exploitation**: High risk due to simple upload mechanism and public exploit code.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: <br>1. Check WordPress plugins for **StoreKeeper for WooCommerce**. <br>2. Verify version is **β€ 14.4.4**. <br>3. Scan for suspicious uploaded files in `wp-content/uploads` if compromised.