Description
The WooCommerce plugin through 3.x for WordPress has a Directory Traversal Vulnerability via a /wp-content/plugins/woocommerce/templates/emails/plain/ URI, which accesses a parent directory. NOTE: a software maintainer indicates that Directory Traversal is not possible because all of the template files have "if (!defined('ABSPATH')) {exit;}" code
Exploits (2)
References (3)
Core 3
Core References
Third Party Advisory, VDB Entry x_refsource_misc
https://www.exploit-db.com/ghdb/4613/
Third Party Advisory x_refsource_misc
https://github.com/woocommerce/woocommerce/issues/17964
Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/43196/
Scores
CVSS v3
7.5
EPSS
0.4290
EPSS Percentile
97.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (1)
automattic/woocommerce
< 3.2.6
Published
Nov 29, 2017
Tracked Since
Feb 18, 2026