CVE-2017-17058

HIGH

WooCommerce <3.x - Path Traversal

Title source: llm
STIX 2.1

Description

The WooCommerce plugin through 3.x for WordPress has a Directory Traversal Vulnerability via a /wp-content/plugins/woocommerce/templates/emails/plain/ URI, which accesses a parent directory. NOTE: a software maintainer indicates that Directory Traversal is not possible because all of the template files have "if (!defined('ABSPATH')) {exit;}" code

Exploits (2)

exploitdb WORKING POC
by Fu2x2000 · textwebappsphp
https://www.exploit-db.com/exploits/43196
nomisec WORKING POC
by fu2x2000 · poc
https://github.com/fu2x2000/CVE-2017-17058-woo_exploit

References (3)

Core 3
Core References
Third Party Advisory, VDB Entry x_refsource_misc
https://www.exploit-db.com/ghdb/4613/
Third Party Advisory x_refsource_misc
https://github.com/woocommerce/woocommerce/issues/17964
Third Party Advisory, VDB Entry exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/43196/

Scores

CVSS v3 7.5
EPSS 0.4290
EPSS Percentile 97.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-22
Status published
Products (1)
automattic/woocommerce < 3.2.6
Published Nov 29, 2017
Tracked Since Feb 18, 2026