Description
The CTT Expresso para WooCommerce plugin for WordPress is vulnerable to sensitive information exposure in all versions up to and including 3.2.12 via the /wp-content/uploads/cepw directory. The generated .pdf and log files are publicly accessible and contain sensitive information such as sender and receiver names, phone numbers, physical addresses, and email addresses
Published: 2024-08-01
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-47735 The CTT Expresso para WooCommerce plugin for WordPress is vulnerable to sensitive information exposure in all versions up to and including 3.2.12 via the /wp-content/uploads/cepw directory. The generated .pdf and log files are publicly accessible and contain sensitive information such as sender and receiver names, phone numbers, physical addresses, and email addresses
History

Sat, 23 Nov 2024 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-532
CPEs cpe:2.3:a:thisfunctional:ctt_expresso_para_woocommerce:*:*:*:*:*:wordpress:*:*

Subscriptions

Thisfunctional Ctt Expresso Para Woocommerce
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:36:33.727Z

Reserved: 2024-07-11T14:35:25.838Z

Link: CVE-2024-6687

cve-icon Vulnrichment

Updated: 2024-08-01T13:31:55.367Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-01T02:15:02.087

Modified: 2024-11-23T00:50:45.110

Link: CVE-2024-6687

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses