Description
The WC Plus plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'pluswc_logo_favicon_logo_base' AJAX action in all versions up to, and including, 1.2.0. This makes it possible for unauthenticated attackers to update the site's favicon logo base.
Problem types
Product status
*
Timeline
2025-08-22: | Disclosed |
Credits
ch4r0n
References
www.wordfence.com/...-3b80-483d-8144-3986ea064669?source=cve
wordpress.org/plugins/wc-plus/