CVE-2024-13622

The File Uploads Addon for WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.7.1 via the 'uploads' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads directory which can contain file attachments uploaded by customers.
Configurations

Configuration 1 (hide)

cpe:2.3:a:imaginate-solutions:file_uploads_addon_for_woocommerce:*:*:*:*:free:wordpress:*:*

History

17 Mar 2025, 14:11

Type Values Removed Values Added
CPE cpe:2.3:a:imaginate-solutions:file_uploads_addon_for_woocommerce:*:*:*:*:*:wordpress:*:* cpe:2.3:a:imaginate-solutions:file_uploads_addon_for_woocommerce:*:*:*:*:free:wordpress:*:*

21 Feb 2025, 16:05

Type Values Removed Values Added
CWE CWE-200 NVD-CWE-noinfo
First Time Imaginate-solutions file Uploads Addon For Woocommerce
Imaginate-solutions
CPE cpe:2.3:a:imaginate-solutions:file_uploads_addon_for_woocommerce:*:*:*:*:*:wordpress:*:*
References () https://plugins.trac.wordpress.org/browser/woo-addon-uploads/trunk/woocommerce-addon-uploads.php#L80 - () https://plugins.trac.wordpress.org/browser/woo-addon-uploads/trunk/woocommerce-addon-uploads.php#L80 - Product
References () https://plugins.trac.wordpress.org/browser/woo-addon-uploads/trunk/includes/class-wau-front-end.php#L81 - () https://plugins.trac.wordpress.org/browser/woo-addon-uploads/trunk/includes/class-wau-front-end.php#L81 - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/9f86bb77-7194-4a8d-b862-6f04d850017b?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/9f86bb77-7194-4a8d-b862-6f04d850017b?source=cve - Third Party Advisory

18 Feb 2025, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-18 05:15

Updated : 2025-03-17 14:11


NVD link : CVE-2024-13622

Mitre link : CVE-2024-13622


JSON object : View

Products Affected

imaginate-solutions

  • file_uploads_addon_for_woocommerce