vulnerability

WordPress Plugin: linet-erp-woocommerce-integration: CVE-2025-31411: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Severity
6
CVSS
(AV:N/AC:H/Au:M/C:C/I:C/A:N)
Published
Apr 10, 2025
Added
May 15, 2025
Modified
May 15, 2025

Description

The Linet ERP-Woocommerce Integration Plugin plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in a function in all versions up to, and including, 3.5.12. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). Attackers can leverage the same functionality to read arbitrary files on the server.

Solution

linet-erp-woocommerce-integration-plugin-cve-2025-31411
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.