CVE-2017-17058
moderate-risk
Published 2017-11-29
The WooCommerce plugin through 3.x for WordPress has a Directory Traversal Vulnerability via a /wp-content/plugins/woocommerce/templates/emails/plain/ URI, which accesses a parent directory. NOTE: a software maintainer indicates that Directory Traversal is not possible because all of the template files have "if (!defined('ABSPATH')) {exit;}" code
Do I need to act?
!
42.9% chance of exploitation in next 30 days
EPSS score — higher than 57% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Third Party Advisory
https://github.com/woocommerce/woocommerce/issues/17964
Third Party Advisory
https://www.exploit-db.com/exploits/43196/
Third Party Advisory
https://www.exploit-db.com/ghdb/4613/
Third Party Advisory
https://github.com/woocommerce/woocommerce/issues/17964
Third Party Advisory
https://www.exploit-db.com/exploits/43196/
Third Party Advisory
https://www.exploit-db.com/ghdb/4613/
48
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
17/34 · Moderate
Exposure
5/34 · Minimal