Lucene search

K
EmagiconeEmagicone Store Manager For Woocommerce

4 matches found

CVE
CVE
added 2025/05/24 4:15 a.m.57 views

CVE-2025-5058

The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the set_image() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the...

9.8CVSS9.9AI score0.00336EPSS
CVE
CVE
added 2025/05/24 4:15 a.m.51 views

CVE-2025-4603

The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_file() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to delete arbitrary file...

9.1CVSS9.6AI score0.00375EPSS
CVE
CVE
added 2025/05/24 4:15 a.m.47 views

CVE-2025-4336

The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the set_file() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the ...

9.8CVSS8.6AI score0.00338EPSS
CVE
CVE
added 2025/05/24 4:15 a.m.44 views

CVE-2025-4602

The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to Arbitrary File Reads in all versions up to, and including, 1.2.5 via the get_file() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can conta...

7.5CVSS5.8AI score0.00087EPSS