Path Traversal Vulnerability in WooCommerce One Page Checkout
CVE-2023-35881
7.6HIGH
Summary
A path traversal vulnerability exists in the WooCommerce One Page Checkout plugin, which may allow attackers to include local files via PHP file inclusion. This flaw can potentially expose sensitive information and compromise the website's security. Users of affected versions, particularly those using versions up to and including 2.3.0, should take immediate action to mitigate risks associated with this vulnerability.
Affected Version(s)
WooCommerce One Page Checkout <= 2.3.0
References
CVSS V3.1
Score:
7.6
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Rafie Muhammad (Patchstack)