The Product Input Fields for WooCommerce plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.9 via the handle_downloads() function due to insufficient file path validation/sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
History

Tue, 26 Nov 2024 07:00:00 +0000

Type Values Removed Values Added
Description The Product Input Fields for WooCommerce plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.9 via the handle_downloads() function due to insufficient file path validation/sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Title Product Input Fields for WooCommerce <= 1.9 - Authenticated (Contributor+) Arbitrary File Read
Weaknesses CWE-35
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-11-26T06:43:45.413Z

Updated: 2024-11-26T14:55:12.593Z

Reserved: 2024-11-05T13:07:00.643Z

Link: CVE-2024-10857

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2024-11-26T07:15:05.003

Modified: 2024-11-26T07:15:05.003

Link: CVE-2024-10857

cve-icon Redhat

No data.