The CTT Expresso para WooCommerce plugin for WordPress is vulnerable to sensitive information exposure in all versions up to and including 3.2.12 via the /wp-content/uploads/cepw directory. The generated .pdf and log files are publicly accessible and contain sensitive information such as sender and receiver names, phone numbers, physical addresses, and email addresses
References
Configurations
Configuration 1 (hide)
|
History
23 Nov 2024, 00:50
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-532 | |
First Time |
Thisfunctional ctt Expresso Para Woocommerce
Thisfunctional |
|
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3127496%40ctt-expresso-para-woocommerce&new=3127496%40ctt-expresso-para-woocommerce&sfp_email=&sfph_mail=#file25 - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/13088645-8233-40fb-8755-cbdf44c0eaf7?source=cve - Third Party Advisory | |
CPE | cpe:2.3:a:thisfunctional:ctt_expresso_para_woocommerce:*:*:*:*:*:wordpress:*:* |
01 Aug 2024, 12:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
01 Aug 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-01 02:15
Updated : 2024-11-23 00:50
NVD link : CVE-2024-6687
Mitre link : CVE-2024-6687
CVE.ORG link : CVE-2024-6687
JSON object : View
Products Affected
thisfunctional
- ctt_expresso_para_woocommerce