Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-17058Path Traversal in Woocommerce

CWE-22Path Traversal4 documents4 sources
Severity
7.5HIGHNVD
EPSS
42.9%
top 2.51%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedNov 29
Latest updateMay 14

Description

The WooCommerce plugin through 3.x for WordPress has a Directory Traversal Vulnerability via a /wp-content/plugins/woocommerce/templates/emails/plain/ URI, which accesses a parent directory. NOTE: a software maintainer indicates that Directory Traversal is not possible because all of the template files have "if (!defined('ABSPATH')) {exit;}" code

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-8fj5-x5p7-cpqv: ** DISPUTED ** The WooCommerce plugin through 32022-05-14
CVEList
CVE-2017-17058: The WooCommerce plugin through 32017-11-29

💥Exploits & PoCs

1
Exploit-DB
WordPress Plugin WooCommerce 2.0/3.0 - Directory Traversal2017-11-28
CVE-2017-17058 — Path Traversal in Woocommerce | cvebase