Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in aribhour Linet ERP-Woocommerce Integration linet-erp-woocommerce-integration allows Path Traversal.This issue affects Linet ERP-Woocommerce Integration: from n/a through <= 3.5.12.
Published: 2025-04-10
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linet ERP‑Woocommerce Integration plugin contains a path‑traversal weakness that allows an attacker to read or delete arbitrary files reachable by the web server process. This flaw permits file operations that can compromise the integrity or confidentiality of files on the host system.

Affected Systems

The vulnerability affects the WordPress plugin Linet ERP‑Woocommerce Integration from aribhour. Any installation using a version up to and including 3.5.12 is potentially vulnerable; versions newer than 3.5.12 are not known to contain the flaw.

Risk and Exploitability

The CVSS score is 5.9, indicating moderate severity. An EPSS score of <1% demonstrates a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is an external actor who can manipulate the plugin’s file‑access functionality with a crafted path value.

Generated by OpenCVE AI on May 2, 2026 at 02:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linet ERP‑Woocommerce Integration plugin to the latest version if one is available to eliminate the path‑traversal flaw.
  • If an update cannot be applied immediately, disable or remove the plugin from the WordPress installation to eliminate the attack surface.
  • Limit the permissions granted to the web server process for the plugin’s directories so that only the necessary read operations are allowed, and implement server‑side path validation to ensure that any resolved file path remains within an approved base directory.

Generated by OpenCVE AI on May 2, 2026 at 02:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10679 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Aribhour Linet ERP-Woocommerce Integration allows Path Traversal.This issue affects Linet ERP-Woocommerce Integration: from n/a through 3.5.12.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Aribhour Linet ERP-Woocommerce Integration allows Path Traversal.This issue affects Linet ERP-Woocommerce Integration: from n/a through 3.5.12. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in aribhour Linet ERP-Woocommerce Integration linet-erp-woocommerce-integration allows Path Traversal.This issue affects Linet ERP-Woocommerce Integration: from n/a through <= 3.5.12.
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N'}


Thu, 10 Apr 2025 10:30:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Aribhour Linet ERP-Woocommerce Integration allows Path Traversal.This issue affects Linet ERP-Woocommerce Integration: from n/a through 3.5.12.
Title WordPress Linet ERP-Woocommerce Integration plugin <= 3.5.12 - Arbitrary File Read/Deletion vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:06.930Z

Reserved: 2025-03-28T10:59:52.730Z

Link: CVE-2025-31411

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2025-04-10T11:15:45.830

Modified: 2026-04-23T15:27:46.763

Link: CVE-2025-31411

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T02:30:25Z

Weaknesses