2.7

CVE-2023-4216

Exploit

Orders Tracking for WooCommerce <= 1.2.5 - Authenticated (Administrator+) Directory Traversal via 'file_url'

The Orders Tracking for WooCommerce WordPress plugin before 1.2.6 doesn't validate the file_url parameter when importing a CSV file, allowing high privilege users with the manage_woocommerce capability to access any file on the web server via a Traversal attack. The content retrieved is however limited to the first line of the file.
Mögliche Gegenmaßnahme
Orders Tracking for WooCommerce: Update to version 1.2.6, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Orders Tracking for WooCommerce
Version * - 1.2.5
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
VillathemeOrders Tracking For Woocommerce SwPlatformwordpress Version < 1.2.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.12% 0.313
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 2.7 1.2 1.4
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
134c704f-9b21-4f2e-91b3-4a467353bcc0 2.7 1.2 1.4
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N