Description
The WooCommerce Designer Pro theme for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 1.9.28. This makes it possible for unauthenticated attackers to read arbitrary files on the server, which can expose DB credentials when the wp-config.php file is read.
Published: 2025-10-31
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure via Arbitrary File Read
Action: Update Plugin
AI Analysis

Impact

The WooCommerce Designer Pro plugin for WordPress contains an attribute that allows attackers without authentication to read any file on the server, a classic example of CWE‑22. When exploited, the plugin will return the contents of the requested file in the HTTP response, and an attacker can easily target sensitive files such as wp‑config.php, exposing database credentials and other confidential configuration data. The impact is the potential disclosure of confidential data and possible exploitation of higher‑privilege access if the attacker can obtain the database credentials.

Affected Systems

All releases of the WooCommerce Designer Pro plugin produced by JMA Plugins, from its first version through 1.9.28, are affected. Any WordPress site that installs or uses one of those versions remains vulnerable regardless of its WordPress core version.

Risk and Exploitability

The CVSS score of 8.6 classifies the vulnerability as high severity, though the EPSS score of less than 1% indicates a currently low probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Attackers can exploit it by sending an unauthenticated HTTP request that supplies an arbitrary file path to the plugin; the plugin then reads and returns that file’s contents without proper path validation.

Generated by OpenCVE AI on April 22, 2026 at 14:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WooCommerce Designer Pro plugin to the most recent release that resolves the file‑path validation flaw.
  • If you cannot upgrade immediately, restrict file‑system permissions so that the web‑server user cannot read wp‑config.php and other sensitive files (e.g., set permissions to 640 or 600).
  • Configure the web server to deny direct HTTP access to wp‑config.php and similar files by adding rules such as '<Files wp-config.php> deny from all </Files>' or equivalent in the site configuration.
  • Deploy a web application firewall or security plugin that detects and blocks path‑traversal requests targeting the plugin.

Generated by OpenCVE AI on April 22, 2026 at 14:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 03 Nov 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Jma Plugins
Jma Plugins woocommerce Designer Pro
Wordpress
Wordpress wordpress
Vendors & Products Jma Plugins
Jma Plugins woocommerce Designer Pro
Wordpress
Wordpress wordpress

Fri, 31 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 31 Oct 2025 07:30:00 +0000

Type Values Removed Values Added
Description The WooCommerce Designer Pro theme for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 1.9.28. This makes it possible for unauthenticated attackers to read arbitrary files on the server, which can expose DB credentials when the wp-config.php file is read.
Title WooCommerce Designer Pro <= 1.9.28 - Unauthenticated Arbitrary File Read
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Jma Plugins Woocommerce Designer Pro
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:46:58.872Z

Reserved: 2025-09-23T18:52:28.625Z

Link: CVE-2025-10897

cve-icon Vulnrichment

Updated: 2025-10-31T17:18:23.922Z

cve-icon NVD

Status : Deferred

Published: 2025-10-31T08:15:36.383

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10897

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T14:00:18Z

Weaknesses