The CTT Expresso para WooCommerce plugin for WordPress is vulnerable to sensitive information exposure in all versions up to and including 3.2.12 via the /wp-content/uploads/cepw directory. The generated .pdf and log files are publicly accessible and contain sensitive information such as sender and receiver names, phone numbers, physical addresses, and email addresses
History

Sat, 23 Nov 2024 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-532
CPEs cpe:2.3:a:thisfunctional:ctt_expresso_para_woocommerce:*:*:*:*:*:wordpress:*:*

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-08-01T01:59:32.153Z

Updated: 2024-08-01T14:16:43.382Z

Reserved: 2024-07-11T14:35:25.838Z

Link: CVE-2024-6687

cve-icon Vulnrichment

Updated: 2024-08-01T13:31:55.367Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-01T02:15:02.087

Modified: 2024-11-23T00:50:45.110

Link: CVE-2024-6687

cve-icon Redhat

No data.