CVE-2026-27540

Rymera Web Co Pty Ltd · Woocommerce Wholesale Lead Capture

The Woocommerce Wholesale Lead Capture plugin allows for the unrestricted upload of files with dangerous types, enabling attackers to upload and execute malicious files on the server.

Executive summary

A critical file upload vulnerability in the Woocommerce Wholesale Lead Capture plugin allows attackers to upload web shells and execute arbitrary code on the WordPress server.

Vulnerability

The plugin fails to restrict the types of files uploaded through its lead capture forms. This allows an attacker to upload files with dangerous extensions (such as .php), which can then be accessed via the web to execute arbitrary code (RCE).

Business impact

With a CVSS score of 9.0, this vulnerability poses a severe threat. Successful exploitation results in a full site compromise, allowing attackers to steal customer data, modify site content, or use the server for malicious purposes. This leads to significant reputational damage and potential financial loss.

Remediation

Immediate Action: Update the Woocommerce Wholesale Lead Capture plugin to the latest version (2.0.3.2 or later). Ensure that the upload directory is configured to prevent the execution of scripts.

Proactive Monitoring: Review the plugin's upload directory for any suspicious files, particularly those with .php, .html, or .js extensions that do not correspond to legitimate user data.

Compensating Controls: Use a Web Application Firewall (WAF) to block the upload of executable file types and implement server-side restrictions that prevent script execution in public upload folders.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Organizations must prioritize this update. The ability to upload and execute files is a direct path to server compromise. Immediate patching and the implementation of strict file upload controls are essential to secure the environment.