The Order Export & Order Import for WooCommerce plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.6.0 via the download_file() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary log files on the server, which can contain sensitive information.
Metrics
Affected Vendors & Products
References
History
Thu, 27 Mar 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Webtoffee
Webtoffee order Export \& Order Import For Woocommerce |
|
CPEs | cpe:2.3:a:webtoffee:order_export_\&_order_import_for_woocommerce:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Webtoffee
Webtoffee order Export \& Order Import For Woocommerce |
Thu, 20 Mar 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Order Export & Order Import for WooCommerce plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.6.0 via the download_file() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary log files on the server, which can contain sensitive information. | |
Title | Order Export & Order Import for WooCommerce <= 2.6.0 - Directory Traversal to Authenticated (Administrator+) Limited Arbitrary File Read via download_file Function | |
Weaknesses | CWE-22 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-03-20T13:07:36.171Z
Reserved: 2025-03-04T23:05:01.390Z
Link: CVE-2024-13920

Updated: 2025-03-20T13:07:14.572Z

Status : Analyzed
Published: 2025-03-20T12:15:13.477
Modified: 2025-03-27T15:24:26.853
Link: CVE-2024-13920

No data.