Lucene search

K
cvelistWPScanCVELIST:CVE-2023-4216
HistorySep 04, 2023 - 11:27 a.m.

CVE-2023-4216 Orders Tracking for WooCommerce < 1.2.6 - Admin+ Arbitrary File Access/Read

2023-09-0411:27:03
WPScan
www.cve.org
3
orders tracking
woocommerce
wordpress
plugin
file access
arbitrary
security vulnerability
privilege escalation

AI Score

3.9

Confidence

High

EPSS

0.001

Percentile

23.9%

The Orders Tracking for WooCommerce WordPress plugin before 1.2.6 doesn’t validate the file_url parameter when importing a CSV file, allowing high privilege users with the manage_woocommerce capability to access any file on the web server via a Traversal attack. The content retrieved is however limited to the first line of the file.

CNA Affected

[
  {
    "vendor": "Unknown",
    "product": "Orders Tracking for WooCommerce",
    "versions": [
      {
        "status": "affected",
        "versionType": "custom",
        "version": "0",
        "lessThan": "1.2.6"
      }
    ],
    "defaultStatus": "unaffected",
    "collectionURL": "https://wordpress.org/plugins"
  }
]

AI Score

3.9

Confidence

High

EPSS

0.001

Percentile

23.9%

Related for CVELIST:CVE-2023-4216