Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 15 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Woocommerce
Woocommerce woocommerce Woosaai Woosaai integration Opvius Ai For Woocommerce Wordpress Wordpress wordpress |
|
| Vendors & Products |
Woocommerce
Woocommerce woocommerce Woosaai Woosaai integration Opvius Ai For Woocommerce Wordpress Wordpress wordpress |
Wed, 14 Jan 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Integration Opvius AI for WooCommerce plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.3.0. This is due to the `process_table_bulk_actions()` function processing user-supplied file paths without authentication checks, nonce verification, or path validation. This makes it possible for unauthenticated attackers to delete or download arbitrary files on the server via the `wsaw-log[]` POST parameter, which can be leveraged to delete critical files like `wp-config.php` or read sensitive configuration files. | |
| Title | Integration Opvius AI for WooCommerce <= 1.3.0 - Unauthenticated Arbitrary File Deletion/Read via Path Traversal | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:45:44.849Z
Reserved: 2025-12-08T22:16:03.894Z
Link: CVE-2025-14301
Updated: 2026-01-15T20:34:47.564Z
Status : Deferred
Published: 2026-01-14T06:15:51.977
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-14301
No data.
OpenCVE Enrichment
Updated: 2026-04-21T16:30:40Z