Description
Woocommerce CSV Importer 3.3.6 contains a path traversal vulnerability that allows any registered user to delete arbitrary files by submitting unescaped filenames through the delete_export_file AJAX action. Attackers can craft POST requests with directory traversal sequences in the filename parameter to delete sensitive files like wp-config.php outside the intended export directory.
Problem types
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Credits
Lenon Leite
References
www.exploit-db.com/exploits/44433 (ExploitDB-44433)
lenonleite.com.br/ (Official Product Homepage)
www.vulncheck.com/...v-importer-path-traversal-file-deletion (VulnCheck Advisory: Woocommerce CSV Importer 3.3.6 Path Traversal File Deletion)