Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12315: CWE-922 Insecure Storage of Sensitive Information in smackcoders Export All Posts, Products, Orders, Refunds & Users

0
High
VulnerabilityCVE-2024-12315cvecve-2024-12315cwe-922
Published: Wed Feb 12 2025 (02/12/2025, 08:25:42 UTC)
Source: CVE Database V5
Vendor/Project: smackcoders
Product: Export All Posts, Products, Orders, Refunds & Users

Description

CVE-2024-12315 is a high-severity vulnerability in the WordPress plugin 'Export All Posts, Products, Orders, Refunds & Users' by smackcoders, affecting all versions up to 2. 9. 3. It allows unauthenticated attackers to access sensitive exported data stored insecurely in the /wp-content/uploads/smack_uci_uploads/exports/ directory. This exposure can lead to leakage of user data and other sensitive information without requiring any authentication or user interaction. The vulnerability stems from improper access controls on the export files, classified under CWE-922 (Insecure Storage of Sensitive Information). Although no known exploits are reported in the wild yet, the ease of exploitation and the sensitivity of the data involved make this a significant risk for WordPress sites using this plugin. Organizations using this plugin should urgently review and secure or remove exposed export files and monitor for suspicious access attempts.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:56:34 UTC

Technical Analysis

CVE-2024-12315 identifies a vulnerability in the WordPress plugin 'Export All Posts, Products, Orders, Refunds & Users' developed by smackcoders. This plugin facilitates exporting various types of site data, including posts, products, orders, refunds, and user information. The vulnerability arises because the plugin stores exported data files in the /wp-content/uploads/smack_uci_uploads/exports/ directory without proper access controls or protections. As a result, these files are publicly accessible over the web, allowing unauthenticated attackers to download sensitive information. The vulnerability is categorized under CWE-922, which concerns insecure storage of sensitive information. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector, no required privileges, no user interaction, and high confidentiality impact. The integrity and availability of the system are not impacted, but the confidentiality breach can expose personal user data and potentially sensitive business information. No patches or fixes have been officially released at the time of publication, and no known exploits have been observed in the wild. The vulnerability affects all versions of the plugin up to and including 2.9.3, which is widely used in WordPress environments for data export functionality. The lack of authentication or authorization checks on the export directory is the root cause, making it trivial for attackers to enumerate and download export files if they know or guess the directory path.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of sensitive information, including user data, orders, refunds, and other exported content. This can lead to privacy violations, regulatory non-compliance (e.g., GDPR, CCPA), and reputational damage for affected organizations. Attackers could use the exposed data for identity theft, phishing campaigns, or further targeted attacks against the organization or its users. Since the vulnerability requires no authentication and no user interaction, it can be exploited remotely and at scale, increasing the risk of mass data leakage. Although the integrity and availability of the WordPress site are not directly affected, the confidentiality breach alone is significant, especially for e-commerce sites or those handling personal user information. Organizations relying on this plugin for data export are at risk of having sensitive business and customer data exposed to unauthorized parties.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations for the presence of the vulnerable 'Export All Posts, Products, Orders, Refunds & Users' plugin. If found, they should restrict access to the /wp-content/uploads/smack_uci_uploads/exports/ directory by implementing server-level access controls such as .htaccess rules or web server configuration to deny public access. Removing or archiving existing export files from this directory is critical to prevent ongoing exposure. Until an official patch is released, consider disabling or uninstalling the plugin if export functionality is not essential. If export features are required, use alternative plugins with verified secure storage practices or implement custom export solutions that securely handle sensitive data. Additionally, monitor web server logs for unusual access patterns to the exports directory and alert on any unauthorized download attempts. Regularly update WordPress and plugins to the latest versions once a patch is available. Finally, educate site administrators about secure file storage and access control best practices to prevent similar issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-06T16:08:51.628Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e36b7ef31ef0b597db7

Added to database: 2/25/2026, 9:48:38 PM

Last enriched: 2/26/2026, 3:56:34 AM

Last updated: 2/26/2026, 7:45:24 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats