Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12875: CWE-73 External Control of File Name or Path in smub Easy Digital Downloads – eCommerce Payments and Subscriptions made easy

0
Medium
VulnerabilityCVE-2024-12875cvecve-2024-12875cwe-73
Published: Sat Dec 21 2024 (12/21/2024, 11:22:44 UTC)
Source: CVE Database V5
Vendor/Project: smub
Product: Easy Digital Downloads – eCommerce Payments and Subscriptions made easy

Description

CVE-2024-12875 is a directory traversal vulnerability in the Easy Digital Downloads – eCommerce Payments and Subscriptions made easy WordPress plugin (up to version 3. 3. 2). It allows authenticated users with Administrator-level privileges or higher to read arbitrary files on the server via the file download functionality. This vulnerability does not require user interaction but does require high-level privileges, limiting exploitation to trusted users. The vulnerability impacts confidentiality by exposing sensitive server files but does not affect integrity or availability. No known exploits are currently reported in the wild. The CVSS score is 4. 9 (medium severity), reflecting the need for authentication and limited scope. Organizations using this plugin should prioritize patching or mitigating this issue to prevent unauthorized data disclosure.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:42:49 UTC

Technical Analysis

The vulnerability identified as CVE-2024-12875 affects the Easy Digital Downloads – eCommerce Payments and Subscriptions made easy plugin for WordPress, versions up to and including 3.3.2. It is classified as CWE-73, External Control of File Name or Path, specifically a directory traversal flaw. This vulnerability arises from insufficient validation or sanitization of user-supplied input in the file download functionality, allowing an authenticated attacker with Administrator-level access or higher to manipulate file paths and access arbitrary files on the server's filesystem. Exploitation does not require user interaction but does require elevated privileges, meaning only trusted users with administrative rights can leverage this flaw. The attacker can read sensitive files potentially containing configuration data, credentials, or other confidential information, which could facilitate further attacks or data breaches. The vulnerability does not permit modification or deletion of files, nor does it impact service availability. The CVSS v3.1 base score is 4.9, reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. This vulnerability highlights the risk of insufficient input validation in WordPress plugins handling file operations, emphasizing the need for secure coding practices and privilege management.

Potential Impact

The primary impact of CVE-2024-12875 is unauthorized disclosure of sensitive information due to arbitrary file read capabilities. Organizations using the affected plugin risk exposure of critical data such as configuration files, database credentials, private keys, or other sensitive content stored on the web server. This could lead to further compromise, including privilege escalation, lateral movement, or data exfiltration. Since exploitation requires Administrator-level access, the threat is mainly from insider threats or attackers who have already compromised administrative credentials. However, once exploited, the attacker gains significant insight into the environment, potentially facilitating more severe attacks. The vulnerability does not directly affect system integrity or availability but undermines confidentiality, which can have severe consequences for compliance, intellectual property protection, and customer trust. E-commerce sites relying on this plugin may face reputational damage and financial losses if sensitive data is leaked. The medium CVSS score reflects the balance between the requirement for high privileges and the significant confidentiality impact.

Mitigation Recommendations

To mitigate CVE-2024-12875, organizations should immediately update the Easy Digital Downloads plugin to a version where this vulnerability is patched once available. Until a patch is released, restrict Administrator-level access strictly to trusted personnel and implement strong authentication controls such as multi-factor authentication to reduce the risk of credential compromise. Review and audit user accounts with elevated privileges regularly to detect unauthorized access. Employ web application firewalls (WAFs) with rules designed to detect and block directory traversal attempts, although this may be limited given the requirement for authenticated access. Harden server file permissions to minimize sensitive file exposure and consider isolating critical files outside the web root where possible. Monitor logs for unusual file access patterns indicative of exploitation attempts. Additionally, conduct security awareness training for administrators to recognize and report suspicious activities. Finally, implement a defense-in-depth strategy including regular backups and incident response plans to quickly recover from potential breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-20T21:27:38.381Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e4bb7ef31ef0b59c702

Added to database: 2/25/2026, 9:48:59 PM

Last enriched: 2/26/2026, 2:42:49 AM

Last updated: 2/26/2026, 9:35:13 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats