The Order Export & Order Import for WooCommerce plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.6.0 via the download_file() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary log files on the server, which can contain sensitive information.
History

Thu, 27 Mar 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Webtoffee
Webtoffee order Export \& Order Import For Woocommerce
CPEs cpe:2.3:a:webtoffee:order_export_\&_order_import_for_woocommerce:*:*:*:*:*:wordpress:*:*
Vendors & Products Webtoffee
Webtoffee order Export \& Order Import For Woocommerce

Thu, 20 Mar 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Mar 2025 11:30:00 +0000

Type Values Removed Values Added
Description The Order Export & Order Import for WooCommerce plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.6.0 via the download_file() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary log files on the server, which can contain sensitive information.
Title Order Export & Order Import for WooCommerce <= 2.6.0 - Directory Traversal to Authenticated (Administrator+) Limited Arbitrary File Read via download_file Function
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-03-20T13:07:36.171Z

Reserved: 2025-03-04T23:05:01.390Z

Link: CVE-2024-13920

cve-icon Vulnrichment

Updated: 2025-03-20T13:07:14.572Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-20T12:15:13.477

Modified: 2025-03-27T15:24:26.853

Link: CVE-2024-13920

cve-icon Redhat

No data.