WordPress Plugin Vulnerabilities
Product Input Fields for WooCommerce < 2.0 - Contributor+ Arbitrary File Read
Description
The plugin is vulnerable to Directory Traversal via the handle_downloads() function due to insufficient file path validation/sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Affects Plugins
References
Classification
Type
TRAVERSAL
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
1337_Wannabe
Verified
No
WPVDB ID
Timeline
Publicly Published
2024-11-25 (about 1 year ago)
Added
2024-12-02 (about 1 year ago)
Last Updated
2024-12-02 (about 1 year ago)