High severity7.5NVD Advisory· Published Feb 18, 2025· Updated Apr 8, 2026
CVE-2024-13622
CVE-2024-13622
Description
The File Uploads Addon for WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.7.1 via the 'uploads' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads directory which can contain file attachments uploaded by customers.
Affected products
1- cpe:2.3:a:imaginate-solutions:file_uploads_addon_for_woocommerce:*:*:*:*:free:wordpress:*:*Range: <=1.7.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.wordfence.com/threat-intel/vulnerabilities/id/9f86bb77-7194-4a8d-b862-6f04d850017bnvdThird Party Advisory
- plugins.trac.wordpress.org/browser/woo-addon-uploads/trunk/includes/class-wau-front-end.phpnvdProduct
- plugins.trac.wordpress.org/browser/woo-addon-uploads/trunk/woocommerce-addon-uploads.phpnvdProduct
- plugins.trac.wordpress.org/changesetnvd
News mentions
0No linked articles in our index yet.