The CTT Expresso para WooCommerce plugin for WordPress is vulnerable to sensitive information exposure in all versions up to and including 3.2.12 via the /wp-content/uploads/cepw directory. The generated .pdf and log files are publicly accessible and contain sensitive information such as sender and receiver names, phone numbers, physical addresses, and email addresses
Metrics
Affected Vendors & Products
References
History
Sat, 23 Nov 2024 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-532 | |
| CPEs | cpe:2.3:a:thisfunctional:ctt_expresso_para_woocommerce:*:*:*:*:*:wordpress:*:* |
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T14:16:43.382Z
Reserved: 2024-07-11T14:35:25.838Z
Link: CVE-2024-6687
Updated: 2024-08-01T13:31:55.367Z
Status : Analyzed
Published: 2024-08-01T02:15:02.087
Modified: 2024-11-23T00:50:45.110
Link: CVE-2024-6687
No data.