Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 26 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Add-ons.org
Add-ons.org product File Upload For Woocommerce Wordpress Wordpress wordpress |
|
| Vendors & Products |
Add-ons.org
Add-ons.org product File Upload For Woocommerce Wordpress Wordpress wordpress |
Wed, 25 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in add-ons.org Product File Upload for WooCommerce products-file-upload-for-woocommerce allows Path Traversal.This issue affects Product File Upload for WooCommerce: from n/a through <= 2.2.4. | |
| Title | WordPress Product File Upload for WooCommerce plugin <= 2.2.4 - Arbitrary File Deletion vulnerability | |
| Weaknesses | CWE-22 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2026-03-26T17:32:19.347Z
Reserved: 2026-02-02T12:52:29.366Z
Link: CVE-2026-25328
Updated: 2026-03-26T17:26:52.158Z
Status : Received
Published: 2026-03-25T17:16:44.247
Modified: 2026-03-26T18:16:27.883
Link: CVE-2026-25328
No data.
OpenCVE Enrichment
Updated: 2026-03-26T11:39:19Z