Lucene search

K
cvelistPatchstackCVELIST:CVE-2023-35881
HistoryMay 17, 2024 - 6:46 a.m.

CVE-2023-35881 WordPress WooCommerce One Page Checkout plugin <= 2.3.0 - Local File Inclusion vulnerability

2024-05-1706:46:48
CWE-22
Patchstack
www.cve.org
cve-2023-35881
vulnerability
path traversal
woocommerce

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

0.0004 Low

EPSS

Percentile

10.5%

Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in WooCommerce WooCommerce One Page Checkout allows PHP Local File Inclusion.This issue affects WooCommerce One Page Checkout: from n/a through 2.3.0.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "WooCommerce One Page Checkout",
    "vendor": "WooCommerce",
    "versions": [
      {
        "changes": [
          {
            "at": "2.4.0",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "2.3.0",
        "status": "affected",
        "version": "n/a",
        "versionType": "custom"
      }
    ]
  }
]

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

0.0004 Low

EPSS

Percentile

10.5%

Related for CVELIST:CVE-2023-35881