Sensitive Information Exposure in Order Export for WooCommerce Plugin by WordPress
CVE-2024-13623
5.9MEDIUM
Key Information:
- Vendor
- WordPress
- Vendor
- CVE Published:
- 31 January 2025
Summary
The Order Export for WooCommerce plugin for WordPress exposes sensitive information in the '/wp-content/uploads' directory due to improper storage configuration. All versions up to and including 3.24 are susceptible when 'Order data storage' is set to the legacy option, allowing unauthenticated attackers to retrieve sensitive data, including exported order information. This vulnerability underscores the importance of using the 'High-performance order storage' setting to mitigate risks.
Affected Version(s)
Order Export for WooCommerce * <= 3.24
References
CVSS V3.1
Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Tim Coen