CVE-2024-13622: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in imagisol File Uploads Addon for WooCommerce
CVE-2024-13622 is a high-severity vulnerability in the imagisol File Uploads Addon for WooCommerce plugin for WordPress, affecting all versions up to 1. 7. 1. It allows unauthenticated attackers to access sensitive information stored insecurely in the /wp-content/uploads directory. This directory may contain file attachments uploaded by customers, exposing potentially confidential data. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. While no known exploits are currently reported in the wild, the ease of exploitation and high confidentiality impact make this a significant threat. Organizations using this plugin should prioritize patching or mitigating this exposure to prevent data leakage. The vulnerability is rated with a CVSS score of 7. 5, indicating high severity.
AI Analysis
Technical Summary
CVE-2024-13622 identifies a sensitive information exposure vulnerability (CWE-200) in the imagisol File Uploads Addon for WooCommerce plugin for WordPress, affecting all versions up to and including 1.7.1. The vulnerability arises because the plugin stores uploaded files in the /wp-content/uploads directory without adequate access controls, allowing unauthenticated remote attackers to retrieve these files directly via HTTP requests. Since the uploads directory can contain sensitive customer data such as personal documents or confidential attachments, unauthorized access leads to a breach of confidentiality. The vulnerability does not require any authentication or user interaction, making it trivially exploitable by attackers scanning for exposed files. The CVSS 3.1 base score is 7.5 (high), reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high confidentiality impact (C:H) with no impact on integrity or availability. No patches or fixes have been linked yet, and no known exploits are reported in the wild, but the exposure of sensitive customer data poses a significant risk to organizations using this plugin. The vulnerability is particularly critical for e-commerce sites relying on WooCommerce with this addon, as it undermines customer trust and regulatory compliance related to data protection.
Potential Impact
The primary impact of CVE-2024-13622 is the unauthorized disclosure of sensitive customer information stored in uploaded files. This can lead to privacy violations, regulatory non-compliance (e.g., GDPR, CCPA), reputational damage, and potential legal liabilities for affected organizations. Attackers can harvest personal data, financial documents, or proprietary information, which may be used for identity theft, fraud, or further targeted attacks. Since the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad, affecting any WooCommerce site using the vulnerable plugin version. The exposure undermines customer trust and can result in loss of business. Although integrity and availability are not impacted, the confidentiality breach alone is significant. Organizations operating in sectors with sensitive customer data, such as retail, healthcare, or finance, face heightened risks. The lack of known exploits in the wild provides a window for proactive mitigation, but the ease of exploitation demands urgent attention.
Mitigation Recommendations
1. Immediately restrict direct public access to the /wp-content/uploads directory by implementing web server access controls such as .htaccess rules for Apache or equivalent configurations for Nginx to deny or limit access to uploaded files. 2. Use authentication and authorization mechanisms to control access to uploaded files, ensuring only authorized users can retrieve sensitive attachments. 3. Monitor and audit the uploads directory regularly for unauthorized access attempts and unusual file retrieval patterns. 4. If possible, move sensitive uploads outside the web root or use a secure storage service with controlled access. 5. Keep the plugin updated and monitor the vendor’s announcements for patches or security updates addressing this vulnerability. 6. Employ Web Application Firewalls (WAFs) to detect and block suspicious requests targeting the uploads directory. 7. Educate site administrators on secure file upload handling and the risks of exposing upload directories. 8. Consider implementing file encryption for sensitive uploads to add an additional layer of protection. 9. Review and enforce least privilege principles for file permissions on the server to minimize exposure. 10. Conduct a thorough security assessment of the WooCommerce environment to identify and remediate any other potential misconfigurations.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Netherlands, Japan, Italy, Spain
CVE-2024-13622: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in imagisol File Uploads Addon for WooCommerce
Description
CVE-2024-13622 is a high-severity vulnerability in the imagisol File Uploads Addon for WooCommerce plugin for WordPress, affecting all versions up to 1. 7. 1. It allows unauthenticated attackers to access sensitive information stored insecurely in the /wp-content/uploads directory. This directory may contain file attachments uploaded by customers, exposing potentially confidential data. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. While no known exploits are currently reported in the wild, the ease of exploitation and high confidentiality impact make this a significant threat. Organizations using this plugin should prioritize patching or mitigating this exposure to prevent data leakage. The vulnerability is rated with a CVSS score of 7. 5, indicating high severity.
AI-Powered Analysis
Technical Analysis
CVE-2024-13622 identifies a sensitive information exposure vulnerability (CWE-200) in the imagisol File Uploads Addon for WooCommerce plugin for WordPress, affecting all versions up to and including 1.7.1. The vulnerability arises because the plugin stores uploaded files in the /wp-content/uploads directory without adequate access controls, allowing unauthenticated remote attackers to retrieve these files directly via HTTP requests. Since the uploads directory can contain sensitive customer data such as personal documents or confidential attachments, unauthorized access leads to a breach of confidentiality. The vulnerability does not require any authentication or user interaction, making it trivially exploitable by attackers scanning for exposed files. The CVSS 3.1 base score is 7.5 (high), reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high confidentiality impact (C:H) with no impact on integrity or availability. No patches or fixes have been linked yet, and no known exploits are reported in the wild, but the exposure of sensitive customer data poses a significant risk to organizations using this plugin. The vulnerability is particularly critical for e-commerce sites relying on WooCommerce with this addon, as it undermines customer trust and regulatory compliance related to data protection.
Potential Impact
The primary impact of CVE-2024-13622 is the unauthorized disclosure of sensitive customer information stored in uploaded files. This can lead to privacy violations, regulatory non-compliance (e.g., GDPR, CCPA), reputational damage, and potential legal liabilities for affected organizations. Attackers can harvest personal data, financial documents, or proprietary information, which may be used for identity theft, fraud, or further targeted attacks. Since the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad, affecting any WooCommerce site using the vulnerable plugin version. The exposure undermines customer trust and can result in loss of business. Although integrity and availability are not impacted, the confidentiality breach alone is significant. Organizations operating in sectors with sensitive customer data, such as retail, healthcare, or finance, face heightened risks. The lack of known exploits in the wild provides a window for proactive mitigation, but the ease of exploitation demands urgent attention.
Mitigation Recommendations
1. Immediately restrict direct public access to the /wp-content/uploads directory by implementing web server access controls such as .htaccess rules for Apache or equivalent configurations for Nginx to deny or limit access to uploaded files. 2. Use authentication and authorization mechanisms to control access to uploaded files, ensuring only authorized users can retrieve sensitive attachments. 3. Monitor and audit the uploads directory regularly for unauthorized access attempts and unusual file retrieval patterns. 4. If possible, move sensitive uploads outside the web root or use a secure storage service with controlled access. 5. Keep the plugin updated and monitor the vendor’s announcements for patches or security updates addressing this vulnerability. 6. Employ Web Application Firewalls (WAFs) to detect and block suspicious requests targeting the uploads directory. 7. Educate site administrators on secure file upload handling and the risks of exposing upload directories. 8. Consider implementing file encryption for sensitive uploads to add an additional layer of protection. 9. Review and enforce least privilege principles for file permissions on the server to minimize exposure. 10. Conduct a thorough security assessment of the WooCommerce environment to identify and remediate any other potential misconfigurations.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-22T16:32:39.211Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e64b7ef31ef0b59fcd1
Added to database: 2/25/2026, 9:49:24 PM
Last enriched: 2/25/2026, 11:11:33 PM
Last updated: 2/26/2026, 6:57:29 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.