Vulnerability Description
The Product Input Fields for WooCommerce plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.9 via the handle_downloads() function due to insufficient file path validation/sanitization. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tychesoftwares | Product Input Fields For Woocommerce | < 2.0 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/3195423/product-input-fields-for-woPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e45207af-3886-4d95-9cdThird Party Advisory
FAQ
What is CVE-2024-10857?
CVE-2024-10857 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The Product Input Fields for WooCommerce plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.9 via the handle_downloads() function due to insufficient fil...
How severe is CVE-2024-10857?
CVE-2024-10857 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-10857?
Check the references section above for vendor advisories and patch information. Affected products include: Tychesoftwares Product Input Fields For Woocommerce.