Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 26 Jan 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Imaginate-solutions
Imaginate-solutions file Uploads Addon For Woocommerce Wordpress Wordpress wordpress |
|
| Vendors & Products |
Imaginate-solutions
Imaginate-solutions file Uploads Addon For Woocommerce Wordpress Wordpress wordpress |
Fri, 23 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 23 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Missing Authorization vulnerability in Imaginate Solutions File Uploads Addon for WooCommerce woo-addon-uploads allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects File Uploads Addon for WooCommerce: from n/a through <= 1.7.3. | |
| Title | WordPress File Uploads Addon for WooCommerce plugin <= 1.7.3 - Broken Access Control vulnerability | |
| Weaknesses | CWE-862 | |
| References |
|
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2026-04-28T16:14:50.636Z
Reserved: 2026-01-23T12:32:28.686Z
Link: CVE-2026-24625
Updated: 2026-01-23T17:04:53.174Z
Status : Deferred
Published: 2026-01-23T15:16:21.767
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-24625
No data.
OpenCVE Enrichment
Updated: 2026-04-18T03:15:35Z