The CTT Expresso para WooCommerce plugin for WordPress is vulnerable to sensitive information exposure in all versions up to and including 3.2.12 via the /wp-content/uploads/cepw directory. The generated .pdf and log files are publicly accessible and contain sensitive information such as sender and receiver names, phone numbers, physical addresses, and email addresses
Metrics
Affected Vendors & Products
References
History
Sat, 23 Nov 2024 01:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-532 | |
CPEs | cpe:2.3:a:thisfunctional:ctt_expresso_para_woocommerce:*:*:*:*:*:wordpress:*:* |
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-08-01T01:59:32.153Z
Updated: 2024-08-01T14:16:43.382Z
Reserved: 2024-07-11T14:35:25.838Z
Link: CVE-2024-6687
Vulnrichment
Updated: 2024-08-01T13:31:55.367Z
NVD
Status : Analyzed
Published: 2024-08-01T02:15:02.087
Modified: 2024-11-23T00:50:45.110
Link: CVE-2024-6687
Redhat
No data.