CVE-2024-13622

The File Uploads Addon for WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.7.1 via the 'uploads' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads directory which can contain file attachments uploaded by customers.
Configurations

Configuration 1 (hide)

cpe:2.3:a:imaginate-solutions:file_uploads_addon_for_woocommerce:*:*:*:*:free:wordpress:*:*

History

17 Mar 2025, 14:11

Type Values Removed Values Added
CPE cpe:2.3:a:imaginate-solutions:file_uploads_addon_for_woocommerce:*:*:*:*:*:wordpress:*:* cpe:2.3:a:imaginate-solutions:file_uploads_addon_for_woocommerce:*:*:*:*:free:wordpress:*:*

21 Feb 2025, 16:05

Type Values Removed Values Added
First Time Imaginate-solutions file Uploads Addon For Woocommerce
Imaginate-solutions
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:imaginate-solutions:file_uploads_addon_for_woocommerce:*:*:*:*:*:wordpress:*:*
References () https://plugins.trac.wordpress.org/browser/woo-addon-uploads/trunk/includes/class-wau-front-end.php#L81 - () https://plugins.trac.wordpress.org/browser/woo-addon-uploads/trunk/includes/class-wau-front-end.php#L81 - Product
References () https://plugins.trac.wordpress.org/browser/woo-addon-uploads/trunk/woocommerce-addon-uploads.php#L80 - () https://plugins.trac.wordpress.org/browser/woo-addon-uploads/trunk/woocommerce-addon-uploads.php#L80 - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/9f86bb77-7194-4a8d-b862-6f04d850017b?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/9f86bb77-7194-4a8d-b862-6f04d850017b?source=cve - Third Party Advisory
Summary
  • (es) El complemento File Uploads Addon for WooCommerce para WordPress es vulnerable a la exposición de información confidencial en todas las versiones hasta la 1.7.1 incluida a través del directorio 'uploads'. Esto permite que atacantes no autenticados extraigan datos confidenciales almacenados de forma insegura en el directorio /wp-content/uploads, que puede contener archivos adjuntos cargados por los clientes.

18 Feb 2025, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-18 05:15

Updated : 2025-03-17 14:11


NVD link : CVE-2024-13622

Mitre link : CVE-2024-13622

CVE.ORG link : CVE-2024-13622


JSON object : View

Products Affected

imaginate-solutions

  • file_uploads_addon_for_woocommerce
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo