We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
The Order Export for WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.24 via the 'uploads' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads directory which can contain exported order information. The plugin is only vulnerable when 'Order data storage' is set to 'WordPress posts storage (legacy)', and cannot be exploited when the default option of 'High-performance order storage' is enabled.
Reserved 2025-01-22 | Published 2025-01-31 | Updated 2025-01-31 | Assigner WordfenceCWE-200 Exposure of Sensitive Information to an Unauthorized Actor
2025-01-30: | Disclosed |
Tim Coen
www.wordfence.com/...-8df3-4611-ad94-6d806aa7328a?source=cve
plugins.trac.wordpress.org/...rce/trunk/inc/JEMEXP_Order.php
plugins.trac.wordpress.org/changeset/3230283/
Support options