Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Arture B.V. StoreContrl Woocommerce storecontrl-wp-connection allows Path Traversal.This issue affects StoreContrl Woocommerce: from n/a through <= 4.1.3.
Published: 2025-04-17
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Adorned by insufficiently restricted path handling, the StoreContrl Woocommerce plugin permits a path traversal exploit that can be used to download any file on the server. The flaw allows an attacker to craft URLs that resolve outside the intended download directory, bypassing the plugin’s security controls. Successfully exploiting this vulnerability could give an adversary access to configuration files, sensitive data, or credentials stored in non‑public files, thereby compromising confidentiality and potentially providing a foothold for further attacks.

Affected Systems

The plugin, developed by Arture B.V., is distributed under the name StoreContrl Woocommerce – StoreContrl WP Connection. All releases from the initial version up through and including version 4.1.3 are vulnerable. If your WordPress site uses any of these versions, it is affected and should be patched immediately.

Risk and Exploitability

Scored with a CVSS 7.5 severity, the vulnerability carries a moderate exploitation probability reflected in an EPSS below 1%, and is not yet listed in CISA’s KEV catalog. The likely attack vector is remote, as the vulnerability is triggered through crafted requests to the WordPress site’s download endpoint. Although the low EPSS score suggests exploitation is not widespread at present, the absence of a KEV listing does not eliminate risk, especially for accounts with privileged access to the plugin’s configuration.

Generated by OpenCVE AI on May 1, 2026 at 09:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the StoreContrl Woocommerce plugin to a version newer than 4.1.3 to remove the directory traversal flaw.
  • Apply web server or firewall rules to restrict the download endpoint so that only authorized users or specified IP ranges can access it.
  • Configure the application to normalise requested file paths, rejecting any '..' or absolute path components, following CWE‑22 mitigation practices.

Generated by OpenCVE AI on May 1, 2026 at 09:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-11751 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Arture B.V. StoreContrl Woocommerce allows Path Traversal. This issue affects StoreContrl Woocommerce: from n/a through 4.1.3.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Arture B.V. StoreContrl Woocommerce allows Path Traversal. This issue affects StoreContrl Woocommerce: from n/a through 4.1.3. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Arture B.V. StoreContrl Woocommerce storecontrl-wp-connection allows Path Traversal.This issue affects StoreContrl Woocommerce: from n/a through <= 4.1.3.
Title WordPress StoreContrl Woocommerce <= 4.1.3 - Arbitrary File Download Vulnerability WordPress StoreContrl Woocommerce plugin <= 4.1.3 - Arbitrary File Download Vulnerability
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Thu, 17 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 17 Apr 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Arture B.V. StoreContrl Woocommerce allows Path Traversal. This issue affects StoreContrl Woocommerce: from n/a through 4.1.3.
Title WordPress StoreContrl Woocommerce <= 4.1.3 - Arbitrary File Download Vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:34.928Z

Reserved: 2025-04-16T06:26:36.912Z

Link: CVE-2025-39568

cve-icon Vulnrichment

Updated: 2025-04-17T17:42:57.406Z

cve-icon NVD

Status : Deferred

Published: 2025-04-17T16:15:58.187

Modified: 2026-04-23T15:29:48.297

Link: CVE-2025-39568

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T10:00:12Z

Weaknesses