WooCommerce Plugin Vulnerable to Directory Traversal
CVE-2024-10857
6.5MEDIUM
Key Information:
- Vendor
- Tychesoftwares
- Status
- Product Input Fields For WooCommerce
- Vendor
- CVE Published:
- 26 November 2024
Summary
The Product Input Fields for WooCommerce plugin for WordPress has a directory traversal vulnerability in the handle_downloads() function. This flaw arises from inadequate file path validation and sanitization. Authenticated attackers with Contributor-level access or higher can exploit this vulnerability to access arbitrary files on the server, potentially exposing sensitive data. This risk emphasizes the importance of securing file handling processes within WordPress plugins to protect user data and maintain the integrity of the web application.
Affected Version(s)
Product Input Fields for WooCommerce * <= 1.9
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
AmrAwad