{"api_version":"1","generated_at":"2026-04-11T05:02:53+00:00","cve":"CVE-2023-4821","urls":{"html":"https://cve.report/CVE-2023-4821","api":"https://cve.report/api/cve/CVE-2023-4821.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-4821","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-4821"},"summary":{"title":"CVE-2023-4821","description":"The Drag and Drop Multiple File Upload for WooCommerce WordPress plugin before 1.1.1 does not filter all potentially dangerous file extensions. Therefore, an attacker can upload unsafe .shtml or .svg files containing malicious scripts.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2023-10-16 20:15:00","updated_at":"2023-11-07 04:23:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/3ac0853b-03f7-44b9-aa9b-72df3e01a9b5","name":"https://wpscan.com/vulnerability/3ac0853b-03f7-44b9-aa9b-72df3e01a9b5","refsource":"MISC","tags":[],"title":"Drag and Drop Multiple File Upload < 1.1.1 - Unauthenticated Stored Cross-Site Scripting WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-4821","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4821","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"4821","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"codedropz","cpe5":"drag_and_drop_multiple_file_uploader","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-4821","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The Drag and Drop Multiple File Upload for WooCommerce WordPress plugin before 1.1.1 does not filter all potentially dangerous file extensions. Therefore, an attacker can upload unsafe .shtml or .svg files containing malicious scripts."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-Site Scripting (XSS)"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Drag and Drop Multiple File Upload for WooCommerce","version":{"version_data":[{"version_affected":"<","version_name":"0","version_value":"1.1.1"}]}}]}}]}},"references":{"reference_data":[{"url":"https://wpscan.com/vulnerability/3ac0853b-03f7-44b9-aa9b-72df3e01a9b5","refsource":"MISC","name":"https://wpscan.com/vulnerability/3ac0853b-03f7-44b9-aa9b-72df3e01a9b5"}]},"generator":{"engine":"WPScan CVE Generator"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"Zeyad Alshahrani"},{"lang":"en","value":"WPScan"}]},"nvd":{"publishedDate":"2023-10-16 20:15:00","lastModifiedDate":"2023-11-07 04:23:00","problem_types":[],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:codedropz:drag_and_drop_multiple_file_uploader:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.1.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}