The Orders Tracking for WooCommerce WordPress plugin before 1.2.6 doesn't validate the file_url parameter when importing a CSV file, allowing high privilege users with the manage_woocommerce capability to access any file on the web server via a Traversal attack. The content retrieved is however limited to the first line of the file.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/8189afc4-17b3-4696-89e1-731011cb9e2b | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/8189afc4-17b3-4696-89e1-731011cb9e2b | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:34
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-04 12:15
Updated : 2024-11-21 08:34
NVD link : CVE-2023-4216
Mitre link : CVE-2023-4216
CVE.ORG link : CVE-2023-4216
JSON object : View
Products Affected
villatheme
- orders_tracking_for_woocommerce
CWE
No CWE.