CVE-2024-10857
Product Input Fields for WooCommerce <= 1.9 - Authenticated (Contributor+) Arbitrary File Read
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Product Input Fields for WooCommerce plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.9 via the handle_downloads() function due to insufficient file path validation/sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
El complemento Product Input Fields for WooCommerce para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 1.9 incluida a través de la función handle_downloads() debido a una validación/desinfección insuficiente de la ruta de archivo. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, lean el contenido de archivos arbitrarios en el servidor, que pueden contener información confidencial.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-11-05 CVE Reserved
- 2024-11-25 CVE Published
- 2024-11-26 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-35: Path Traversal: '.../...//'
CAPEC
References (2)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tychesoftwares Search vendor "Tychesoftwares" | Product Input Fields For WooCommerce Search vendor "Tychesoftwares" for product "Product Input Fields For WooCommerce" | <= 1.9 Search vendor "Tychesoftwares" for product "Product Input Fields For WooCommerce" and version " <= 1.9" | en |
Affected
|