Emagicone

Emagicone Store Manager For Woocommerce

4 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.87%
  • Veröffentlicht 24.05.2025 03:37:32
  • Zuletzt bearbeitet 08.04.2026 18:24:47

The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the set_file() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenti...

Exploit
  • EPSS 3.02%
  • Veröffentlicht 24.05.2025 03:37:32
  • Zuletzt bearbeitet 08.04.2026 17:20:45

The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_file() function in all versions up to, and including, 1.2.5. This makes it possible for u...

Exploit
  • EPSS 2.47%
  • Veröffentlicht 24.05.2025 03:37:32
  • Zuletzt bearbeitet 08.04.2026 18:24:51

The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the set_image() function in all versions up to, and including, 1.2.5. This makes it possible for unauthent...

Exploit
  • EPSS 0.39%
  • Veröffentlicht 24.05.2025 03:37:31
  • Zuletzt bearbeitet 08.04.2026 17:20:45

The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to Arbitrary File Reads in all versions up to, and including, 1.2.5 via the get_file() function. This makes it possible for unauthenticated attackers to read the contents ...