vulnerability
WordPress Plugin: linet-erp-woocommerce-integration: CVE-2025-31411: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:H/Au:M/C:C/I:C/A:N) | Apr 10, 2025 | May 15, 2025 | May 15, 2025 |
Severity
6
CVSS
(AV:N/AC:H/Au:M/C:C/I:C/A:N)
Published
Apr 10, 2025
Added
May 15, 2025
Modified
May 15, 2025
Description
The Linet ERP-Woocommerce Integration Plugin plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in a function in all versions up to, and including, 3.5.12. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). Attackers can leverage the same functionality to read arbitrary files on the server.
Solution
linet-erp-woocommerce-integration-plugin-cve-2025-31411

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.