Description
The Integration Opvius AI for WooCommerce plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.3.0. This is due to the `process_table_bulk_actions()` function processing user-supplied file paths without authentication checks, nonce verification, or path validation. This makes it possible for unauthenticated attackers to delete or download arbitrary files on the server via the `wsaw-log[]` POST parameter, which can be leveraged to delete critical files like `wp-config.php` or read sensitive configuration files.
Published: 2026-01-14
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated file deletion or read via path traversal
Action: Immediate Patch
AI Analysis

Impact

The Integration Opvius AI for WooCommerce plugin contains a path traversal flaw in the process_table_bulk_actions() function, which accepts arbitrary file paths through the wsaw-log[] POST parameter without authentication, nonce verification, or path validation. An attacker can leverage this to delete or download any file on the web server, including critical files such as wp-config.php, thereby compromising confidentiality and integrity of the site’s configuration and potentially enabling further exploitation.

Affected Systems

The vulnerability affects the WordPress plugin Integration Opvius AI for WooCommerce for all releases up to and including version 1.3.0. No other products or versions are listed as affected.

Risk and Exploitability

The flaw carries a CVSS score of 9.8, indicating a very high severity. The EPSS score is reported as less than 1%, suggesting a low likelihood of exploitation in the wild; however, the vulnerability is listed as not being included in the CISA KEV catalog. Attackers can exploit the flaw over the network via an unauthenticated HTTP POST request containing the wsaw-log[] parameter, making the attack vector trivial for any user with network access to the site. If successful, attackers could delete essential configuration files or read sensitive data, potentially leading to a full compromise of the WordPress installation.

Generated by OpenCVE AI on April 21, 2026 at 16:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Integration Opvius AI for WooCommerce plugin to the latest available version that removes the insecure file handling (or install a patch from the vendor if released).
  • If an update is unavailable, disable or uninstall the plugin to eliminate the attack surface, and remove any remaining plugin files from the server.
  • Configure the web application firewall or server configuration to block or whitelist the wsaw-log[] POST parameter, and restrict file access for the plugin to the intended log directory only.

Generated by OpenCVE AI on April 21, 2026 at 16:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 15 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 Jan 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Woocommerce
Woocommerce woocommerce
Woosaai
Woosaai integration Opvius Ai For Woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Woocommerce
Woocommerce woocommerce
Woosaai
Woosaai integration Opvius Ai For Woocommerce
Wordpress
Wordpress wordpress

Wed, 14 Jan 2026 05:45:00 +0000

Type Values Removed Values Added
Description The Integration Opvius AI for WooCommerce plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.3.0. This is due to the `process_table_bulk_actions()` function processing user-supplied file paths without authentication checks, nonce verification, or path validation. This makes it possible for unauthenticated attackers to delete or download arbitrary files on the server via the `wsaw-log[]` POST parameter, which can be leveraged to delete critical files like `wp-config.php` or read sensitive configuration files.
Title Integration Opvius AI for WooCommerce <= 1.3.0 - Unauthenticated Arbitrary File Deletion/Read via Path Traversal
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Woocommerce Woocommerce
Woosaai Integration Opvius Ai For Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:45:44.849Z

Reserved: 2025-12-08T22:16:03.894Z

Link: CVE-2025-14301

cve-icon Vulnrichment

Updated: 2026-01-15T20:34:47.564Z

cve-icon NVD

Status : Deferred

Published: 2026-01-14T06:15:51.977

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14301

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T16:30:40Z

Weaknesses