The W2S – Migrate WooCommerce to Shopify plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.2.1 via the 'viw2s_view_log' AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
References
Configurations
History
31 Jan 2025, 19:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3227799%40w2s-migrate-woo-to-shopify&new=3227799%40w2s-migrate-woo-to-shopify&sfp_email=&sfph_mail= - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/8a8eeae9-572c-420a-be7d-a240c54e96ae?source=cve - Third Party Advisory | |
CPE | cpe:2.3:a:villatheme:w2s:*:*:*:*:*:wordpress:*:* | |
First Time |
Villatheme
Villatheme w2s |
|
Summary |
|
|
CWE | NVD-CWE-noinfo |
30 Jan 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-30 14:15
Updated : 2025-01-31 19:01
NVD link : CVE-2024-12861
Mitre link : CVE-2024-12861
CVE.ORG link : CVE-2024-12861
JSON object : View
Products Affected
villatheme
- w2s
CWE