Impact
The vulnerability in PluginEver’s Product Category Slider for WooCommerce arises from an improper control of filenames used in PHP include/require statements, enabling a local file inclusion flaw. An attacker who can influence the inclusion path could read arbitrary files on the server and, in some configurations, execute code, potentially compromising the confidentiality, integrity, and availability of the hosted WordPress site.
Affected Systems
PluginEver’s Product Category Slider for WooCommerce is vulnerable for all releases up to and including version 4.3.4. The affected software runs within WordPress installations that have installed a vulnerable instance of this plugin.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity while the EPSS score of less than 1 % signals a very low likelihood of current exploitation. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, which further suggests the threat level is moderate. Likely bypassing controls would require the attacker to be able to influence the plugin’s file path handling, typically through crafted input or file upload paths, without network exposure. Given the modest exploitation probability, an attacker’s success would largely depend on the presence of other vulnerabilities or misconfigurations that facilitate the inclusion path control. Nonetheless, the potential to read sensitive files or execute code warrants proactive remediation.
OpenCVE Enrichment
EUVD