Lucene search

K
wpexploitUtkarsh AgrawalWPEX-ID:8189AFC4-17B3-4696-89E1-731011CB9E2B
HistoryAug 14, 2023 - 12:00 a.m.

Orders Tracking for WooCommerce < 1.2.6 - Admin+ Arbitrary File Access/Read

2023-08-1400:00:00
Utkarsh Agrawal
33
admin
arbitrary file access
exploit
woocommerce
security issue

3.9 Low

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.1%

Description The plugin doesn’t validate the file_url parameter when importing a CSV file, allowing high privilege users with the manage_woocommerce capability to access any file on the web server via a Traversal attack. The content retrieved is however limited to the first line of the file.

As an admin, open the following URL

https://example.com/wp-admin/admin.php?page=woo-orders-tracking-import-csv&step=mapping&file_url=/etc/passwd

Change the file_url parameter to a file on the web server and observe that the plugin will display the first line of the file in each of the "Column name" dropdowns.

3.9 Low

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.1%

Related for WPEX-ID:8189AFC4-17B3-4696-89E1-731011CB9E2B