Lucene search

K
vulnrichmentPatchstackVULNRICHMENT:CVE-2023-35881
HistoryMay 17, 2024 - 6:46 a.m.

CVE-2023-35881 WordPress WooCommerce One Page Checkout plugin <= 2.3.0 - Local File Inclusion vulnerability

2024-05-1706:46:48
CWE-22
Patchstack
github.com
cve-2023-35881
wordpress
woocommerce
local file inclusion
path traversal
php

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

6.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.6%

Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in WooCommerce WooCommerce One Page Checkout allows PHP Local File Inclusion.This issue affects WooCommerce One Page Checkout: from n/a through 2.3.0.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "WooCommerce One Page Checkout",
    "vendor": "WooCommerce",
    "versions": [
      {
        "changes": [
          {
            "at": "2.4.0",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "2.3.0",
        "status": "affected",
        "version": "n/a",
        "versionType": "custom"
      }
    ]
  }
]

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

6.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.6%

Related for VULNRICHMENT:CVE-2023-35881