[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fNEFrFz6nOeme_m4Uwe-DDuL6u8YDdE9YlG4rcMjIZJY":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-33566","orderconvo-missing-authorization-to-arbitrary-file-upload","OrderConvo \u003C= 12.4 - Missing Authorization to Arbitrary File Upload","The Admin and Customer Messages After Order for WooCommerce: OrderConvo plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on a REST API endpoint in all versions up to, and including, 12.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.","admin-and-client-message-after-order-for-woocommerce",null,"\u003C=12.4","12.5","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Missing Authorization","2024-04-25 00:00:00","2024-05-01 12:41:24",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fd6686b67-8648-4f1b-8e05-fa67db60c8aa?source=api-prod",7]