CVE-2025-54029
extendons · extendons WooCommerce csv import export
**A high-severity Path Traversal vulnerability in the WooCommerce csv import export plugin could allow an attacker with certain privileges to read arbitrary files from the server, potentially exposing.
Executive summary
A high-severity Path Traversal vulnerability in the WooCommerce csv import export plugin could allow an attacker with certain privileges to read arbitrary files from the server, potentially exposing sensitive credentials and leading to a full system compromise.
Vulnerability
The plugin suffers from a Path Traversal vulnerability, also known as 'directory traversal'. An attacker, likely requiring some level of authentication to access the import/export functionality, can manipulate file path inputs to navigate outside of the intended directory and access sensitive files on the web server's file system.
Business impact
This vulnerability is rated 7.7 (High) on the CVSS scale. A successful exploit could allow an attacker to read critical files such as wp-config.php (containing database credentials), /etc/passwd, or other application source code and configuration files. Gaining access to these files can quickly lead to a complete compromise of the website, the database, and potentially the underlying server.
Remediation
Immediate Action: Apply the latest security patch for the WooCommerce csv import export plugin immediately. If a patch is not available, disable the plugin until a fix is released.
Proactive Monitoring: Review web server access logs for suspicious file path manipulations in requests related to the plugin, such as patterns like ../ or ..\\.
Compensating Controls: Ensure web server and PHP configurations are hardened to restrict file system access as much as possible. A Web Application Firewall (WAF) may be able to detect and block path traversal attempts.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The ability to read arbitrary files from the server is a critical security failure. Administrators must treat this vulnerability with high urgency and apply the vendor's update immediately. Delaying remediation leaves sensitive server data, including credentials, exposed to potential theft.