Description
The CTT Expresso para WooCommerce plugin for WordPress is vulnerable to sensitive information exposure in all versions up to and including 3.2.12 via the /wp-content/uploads/cepw directory. The generated .pdf and log files are publicly accessible and contain sensitive information such as sender and receiver names, phone numbers, physical addresses, and email addresses
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47735 | The CTT Expresso para WooCommerce plugin for WordPress is vulnerable to sensitive information exposure in all versions up to and including 3.2.12 via the /wp-content/uploads/cepw directory. The generated .pdf and log files are publicly accessible and contain sensitive information such as sender and receiver names, phone numbers, physical addresses, and email addresses |
References
History
Sat, 23 Nov 2024 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-532 | |
| CPEs | cpe:2.3:a:thisfunctional:ctt_expresso_para_woocommerce:*:*:*:*:*:wordpress:*:* |
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:36:33.727Z
Reserved: 2024-07-11T14:35:25.838Z
Link: CVE-2024-6687
Updated: 2024-08-01T13:31:55.367Z
Status : Analyzed
Published: 2024-08-01T02:15:02.087
Modified: 2024-11-23T00:50:45.110
Link: CVE-2024-6687
No data.
OpenCVE Enrichment
No data.
EUVD