CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
11.0%
SSVC
Exploitation
none
Automatable
no
Technical Impact
total
Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in Crocoblock JetWidgets for Elementor and WooCommerce allows PHP Local File Inclusion.This issue affects JetWidgets for Elementor and WooCommerce: from n/a through 1.1.7.
[
{
"vendor": "Crocoblock",
"product": "JetWidgets for Elementor and WooCommerce",
"versions": [
{
"status": "affected",
"changes": [
{
"at": "1.1.8",
"status": "unaffected"
}
],
"version": "n/a",
"versionType": "custom",
"lessThanOrEqual": "1.1.7"
}
],
"packageName": "jetwoo-widgets-for-elementor",
"collectionURL": "https://wordpress.org/plugins",
"defaultStatus": "unaffected"
}
]
[
{
"cpes": [
"cpe:2.3:a:crocoblock:jetwidgets_for_elementor:*:*:*:*:*:*:*:*"
],
"vendor": "crocoblock",
"product": "jetwidgets_for_elementor",
"versions": [
{
"status": "affected",
"version": "0",
"versionType": "custom",
"lessThanOrEqual": "1.1.7"
}
],
"defaultStatus": "unaffected"
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
11.0%
SSVC
Exploitation
none
Automatable
no
Technical Impact
total