CVE-2024-12875: CWE-73 External Control of File Name or Path in smub Easy Digital Downloads – eCommerce Payments and Subscriptions made easy
CVE-2024-12875 is a directory traversal vulnerability in the Easy Digital Downloads – eCommerce Payments and Subscriptions made easy WordPress plugin (up to version 3. 3. 2). It allows authenticated users with Administrator-level privileges or higher to read arbitrary files on the server via the file download functionality. This vulnerability does not require user interaction but does require high-level privileges, limiting exploitation to trusted users. The vulnerability impacts confidentiality by exposing sensitive server files but does not affect integrity or availability. No known exploits are currently reported in the wild. The CVSS score is 4. 9 (medium severity), reflecting the need for authentication and limited scope. Organizations using this plugin should prioritize patching or mitigating this issue to prevent unauthorized data disclosure.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2024-12875 affects the Easy Digital Downloads – eCommerce Payments and Subscriptions made easy plugin for WordPress, versions up to and including 3.3.2. It is classified as CWE-73, External Control of File Name or Path, specifically a directory traversal flaw. This vulnerability arises from insufficient validation or sanitization of user-supplied input in the file download functionality, allowing an authenticated attacker with Administrator-level access or higher to manipulate file paths and access arbitrary files on the server's filesystem. Exploitation does not require user interaction but does require elevated privileges, meaning only trusted users with administrative rights can leverage this flaw. The attacker can read sensitive files potentially containing configuration data, credentials, or other confidential information, which could facilitate further attacks or data breaches. The vulnerability does not permit modification or deletion of files, nor does it impact service availability. The CVSS v3.1 base score is 4.9, reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. This vulnerability highlights the risk of insufficient input validation in WordPress plugins handling file operations, emphasizing the need for secure coding practices and privilege management.
Potential Impact
The primary impact of CVE-2024-12875 is unauthorized disclosure of sensitive information due to arbitrary file read capabilities. Organizations using the affected plugin risk exposure of critical data such as configuration files, database credentials, private keys, or other sensitive content stored on the web server. This could lead to further compromise, including privilege escalation, lateral movement, or data exfiltration. Since exploitation requires Administrator-level access, the threat is mainly from insider threats or attackers who have already compromised administrative credentials. However, once exploited, the attacker gains significant insight into the environment, potentially facilitating more severe attacks. The vulnerability does not directly affect system integrity or availability but undermines confidentiality, which can have severe consequences for compliance, intellectual property protection, and customer trust. E-commerce sites relying on this plugin may face reputational damage and financial losses if sensitive data is leaked. The medium CVSS score reflects the balance between the requirement for high privileges and the significant confidentiality impact.
Mitigation Recommendations
To mitigate CVE-2024-12875, organizations should immediately update the Easy Digital Downloads plugin to a version where this vulnerability is patched once available. Until a patch is released, restrict Administrator-level access strictly to trusted personnel and implement strong authentication controls such as multi-factor authentication to reduce the risk of credential compromise. Review and audit user accounts with elevated privileges regularly to detect unauthorized access. Employ web application firewalls (WAFs) with rules designed to detect and block directory traversal attempts, although this may be limited given the requirement for authenticated access. Harden server file permissions to minimize sensitive file exposure and consider isolating critical files outside the web root where possible. Monitor logs for unusual file access patterns indicative of exploitation attempts. Additionally, conduct security awareness training for administrators to recognize and report suspicious activities. Finally, implement a defense-in-depth strategy including regular backups and incident response plans to quickly recover from potential breaches.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-12875: CWE-73 External Control of File Name or Path in smub Easy Digital Downloads – eCommerce Payments and Subscriptions made easy
Description
CVE-2024-12875 is a directory traversal vulnerability in the Easy Digital Downloads – eCommerce Payments and Subscriptions made easy WordPress plugin (up to version 3. 3. 2). It allows authenticated users with Administrator-level privileges or higher to read arbitrary files on the server via the file download functionality. This vulnerability does not require user interaction but does require high-level privileges, limiting exploitation to trusted users. The vulnerability impacts confidentiality by exposing sensitive server files but does not affect integrity or availability. No known exploits are currently reported in the wild. The CVSS score is 4. 9 (medium severity), reflecting the need for authentication and limited scope. Organizations using this plugin should prioritize patching or mitigating this issue to prevent unauthorized data disclosure.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2024-12875 affects the Easy Digital Downloads – eCommerce Payments and Subscriptions made easy plugin for WordPress, versions up to and including 3.3.2. It is classified as CWE-73, External Control of File Name or Path, specifically a directory traversal flaw. This vulnerability arises from insufficient validation or sanitization of user-supplied input in the file download functionality, allowing an authenticated attacker with Administrator-level access or higher to manipulate file paths and access arbitrary files on the server's filesystem. Exploitation does not require user interaction but does require elevated privileges, meaning only trusted users with administrative rights can leverage this flaw. The attacker can read sensitive files potentially containing configuration data, credentials, or other confidential information, which could facilitate further attacks or data breaches. The vulnerability does not permit modification or deletion of files, nor does it impact service availability. The CVSS v3.1 base score is 4.9, reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. This vulnerability highlights the risk of insufficient input validation in WordPress plugins handling file operations, emphasizing the need for secure coding practices and privilege management.
Potential Impact
The primary impact of CVE-2024-12875 is unauthorized disclosure of sensitive information due to arbitrary file read capabilities. Organizations using the affected plugin risk exposure of critical data such as configuration files, database credentials, private keys, or other sensitive content stored on the web server. This could lead to further compromise, including privilege escalation, lateral movement, or data exfiltration. Since exploitation requires Administrator-level access, the threat is mainly from insider threats or attackers who have already compromised administrative credentials. However, once exploited, the attacker gains significant insight into the environment, potentially facilitating more severe attacks. The vulnerability does not directly affect system integrity or availability but undermines confidentiality, which can have severe consequences for compliance, intellectual property protection, and customer trust. E-commerce sites relying on this plugin may face reputational damage and financial losses if sensitive data is leaked. The medium CVSS score reflects the balance between the requirement for high privileges and the significant confidentiality impact.
Mitigation Recommendations
To mitigate CVE-2024-12875, organizations should immediately update the Easy Digital Downloads plugin to a version where this vulnerability is patched once available. Until a patch is released, restrict Administrator-level access strictly to trusted personnel and implement strong authentication controls such as multi-factor authentication to reduce the risk of credential compromise. Review and audit user accounts with elevated privileges regularly to detect unauthorized access. Employ web application firewalls (WAFs) with rules designed to detect and block directory traversal attempts, although this may be limited given the requirement for authenticated access. Harden server file permissions to minimize sensitive file exposure and consider isolating critical files outside the web root where possible. Monitor logs for unusual file access patterns indicative of exploitation attempts. Additionally, conduct security awareness training for administrators to recognize and report suspicious activities. Finally, implement a defense-in-depth strategy including regular backups and incident response plans to quickly recover from potential breaches.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-20T21:27:38.381Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e4bb7ef31ef0b59c702
Added to database: 2/25/2026, 9:48:59 PM
Last enriched: 2/26/2026, 2:42:49 AM
Last updated: 2/26/2026, 9:35:13 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.