The Order Export & Order Import for WooCommerce plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.6.0 via the download_file() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary log files on the server, which can contain sensitive information.
References
Configurations
Configuration 1 (hide)
|
History
27 Mar 2025, 15:24
Type | Values Removed | Values Added |
---|---|---|
First Time |
Webtoffee
Webtoffee order Export \& Order Import For Woocommerce |
|
CPE | cpe:2.3:a:webtoffee:order_export_\&_order_import_for_woocommerce:*:*:*:*:*:wordpress:*:* | |
Summary |
|
|
References | () https://plugins.trac.wordpress.org/browser/order-import-export-for-woocommerce/trunk/admin/modules/history/history.php#L751 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3258567/ - Patch | |
References | () https://wordpress.org/plugins/users-customers-import-export-for-wp-woocommerce/#developers - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/dba84eb3-f48a-4175-a652-7c11b12c9afc?source=cve - Third Party Advisory |
20 Mar 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-20 12:15
Updated : 2025-03-27 15:24
NVD link : CVE-2024-13920
Mitre link : CVE-2024-13920
CVE.ORG link : CVE-2024-13920
JSON object : View
Products Affected
webtoffee
- order_export_\&_order_import_for_woocommerce
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')