Description
Path Traversal: '.../...//' vulnerability in Snowray Software File Uploader for WooCommerce file-uploader-for-woocommerce allows Path Traversal.This issue affects File Uploader for WooCommerce: from n/a through <= 1.0.4.
Published: 2026-03-25
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote or local file access allowing an attacker to read arbitrary files on the server
Action: Patch Immediately
AI Analysis

Impact

The vulnerability is a path traversal flaw (CWE-35) that permits an attacker to influence the file path used by the Snowray Software File Uploader for WooCommerce plugin. By manipulating the request, an adversary can read files outside the intended upload directory. The impact is the unauthorized disclosure of sensitive data stored on the server, potentially exposing configuration files, credentials, or user content, and undermining confidentiality. No direct code execution or privilege escalation is described, but the breadth of read access can be critical in many environments.

Affected Systems

Snowray Software’s File Uploader for WooCommerce plugin is vulnerable in all releases up to and including version 1.0.4. The affected platform is WordPress, and the issue is present wherever the plugin is installed with a version less than or equal to 1.0.4.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity. The EPSS score of less than 1% suggests a relatively low probability of exploitation at this time, and the vulnerability is not listed in the CISA KEV catalog. Likely attack vectors involve an unauthenticated or authenticated user submitting specially crafted requests to the plugin’s upload endpoint, exploiting the directory traversal sequence to access arbitrary files. While no explicit authentication requirement is given in the description, the nature of the flaw implies that any user who can trigger the endpoint may exploit it, making it a high-risk vulnerability for publicly exposed sites using the affected plugin version.

Generated by OpenCVE AI on March 26, 2026 at 18:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch or upgrade the File Uploader for WooCommerce plugin to version 1.0.5 or later

Generated by OpenCVE AI on March 26, 2026 at 18:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Thu, 26 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Snowray Software
Snowray Software file Uploader For Woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Snowray Software
Snowray Software file Uploader For Woocommerce
Wordpress
Wordpress wordpress

Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Path Traversal: '.../...//' vulnerability in Snowray Software File Uploader for WooCommerce file-uploader-for-woocommerce allows Path Traversal.This issue affects File Uploader for WooCommerce: from n/a through <= 1.0.4.
Title WordPress File Uploader for WooCommerce plugin <= 1.0.4 - Path Traversal vulnerability
Weaknesses CWE-35
References

Subscriptions

Snowray Software File Uploader For Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-23T14:14:09.521Z

Reserved: 2026-02-02T12:53:12.987Z

Link: CVE-2026-25397

cve-icon Vulnrichment

Updated: 2026-03-26T17:00:17.743Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T17:16:49.213

Modified: 2026-04-23T15:37:08.303

Link: CVE-2026-25397

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:31:49Z

Weaknesses