The Product Input Fields for WooCommerce plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.9 via the handle_downloads() function due to insufficient file path validation/sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Metrics
Affected Vendors & Products
References
History
Tue, 26 Nov 2024 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Product Input Fields for WooCommerce plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.9 via the handle_downloads() function due to insufficient file path validation/sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. | |
Title | Product Input Fields for WooCommerce <= 1.9 - Authenticated (Contributor+) Arbitrary File Read | |
Weaknesses | CWE-35 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-11-26T06:43:45.413Z
Updated: 2024-11-26T14:55:12.593Z
Reserved: 2024-11-05T13:07:00.643Z
Link: CVE-2024-10857
Vulnrichment
No data.
NVD
Status : Received
Published: 2024-11-26T07:15:05.003
Modified: 2024-11-26T07:15:05.003
Link: CVE-2024-10857
Redhat
No data.