CVE-2024-13640: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in tychesoftwares Print Invoice & Delivery Notes for WooCommerce
The Print Invoice & Delivery Notes for WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.4.1 via the 'wcdn/invoice' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/wcdn/invoice directory which can contain invoice files if an email attachment setting is enabled.
AI Analysis
Technical Summary
CVE-2024-13640 is a medium-severity vulnerability affecting the 'Print Invoice & Delivery Notes for WooCommerce' WordPress plugin developed by tychesoftwares. This vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. The issue affects all versions up to and including 5.4.1 of the plugin. The root cause lies in the insecure storage and access control of invoice files within the '/wp-content/uploads/wcdn/invoice' directory. When the plugin's email attachment setting is enabled, invoice files containing sensitive customer and transaction data are saved in this directory without proper access restrictions. This misconfiguration allows unauthenticated attackers to directly access and download these invoice files by navigating to the 'wcdn/invoice' directory on the affected WordPress site. The vulnerability does not require any authentication or user interaction, but the attack complexity is rated high due to the need to identify vulnerable sites and the specific directory structure. The CVSS 3.1 base score is 5.9, reflecting a medium severity level, with a vector indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N). There are no known exploits in the wild at the time of publication, and no patches have been linked yet. This vulnerability primarily risks the confidentiality of sensitive customer data, including personal and financial information contained in invoices, which could be leveraged for identity theft, fraud, or further targeted attacks.
Potential Impact
For European organizations using WooCommerce with the affected plugin, this vulnerability poses a significant risk to customer privacy and data protection compliance, particularly under the GDPR framework. Exposure of invoice data can lead to unauthorized disclosure of personally identifiable information (PII), including names, addresses, purchase details, and potentially payment information. Such data breaches can result in regulatory penalties, reputational damage, and loss of customer trust. Additionally, exposed data could be used by threat actors for phishing campaigns or social engineering attacks targeting European customers or employees. The impact is heightened for e-commerce businesses with large customer bases or those handling sensitive transactions. Since the vulnerability allows unauthenticated access, attackers can exploit it remotely without needing credentials, increasing the risk of widespread data leakage. However, the attack complexity being high somewhat limits mass exploitation but does not eliminate targeted attacks against high-value organizations.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the 'Print Invoice & Delivery Notes for WooCommerce' plugin is installed and determine the version in use. Until an official patch is released, organizations should consider disabling the plugin or the email attachment feature that stores invoices in the vulnerable directory. Restricting access to the '/wp-content/uploads/wcdn/invoice' directory via web server configuration (e.g., using .htaccess rules for Apache or equivalent for Nginx) to deny public access is a critical temporary mitigation. Implementing authentication or IP-based restrictions on this directory can also reduce exposure. Monitoring web server logs for suspicious access attempts to the 'wcdn/invoice' path can help detect exploitation attempts. Organizations should also review and enhance their data retention policies to minimize sensitive data storage duration. Once a patch is available, prompt application of updates is essential. Additionally, informing customers about potential data exposure and preparing incident response plans aligned with GDPR breach notification requirements is advisable.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-13640: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in tychesoftwares Print Invoice & Delivery Notes for WooCommerce
Description
The Print Invoice & Delivery Notes for WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.4.1 via the 'wcdn/invoice' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/wcdn/invoice directory which can contain invoice files if an email attachment setting is enabled.
AI-Powered Analysis
Technical Analysis
CVE-2024-13640 is a medium-severity vulnerability affecting the 'Print Invoice & Delivery Notes for WooCommerce' WordPress plugin developed by tychesoftwares. This vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. The issue affects all versions up to and including 5.4.1 of the plugin. The root cause lies in the insecure storage and access control of invoice files within the '/wp-content/uploads/wcdn/invoice' directory. When the plugin's email attachment setting is enabled, invoice files containing sensitive customer and transaction data are saved in this directory without proper access restrictions. This misconfiguration allows unauthenticated attackers to directly access and download these invoice files by navigating to the 'wcdn/invoice' directory on the affected WordPress site. The vulnerability does not require any authentication or user interaction, but the attack complexity is rated high due to the need to identify vulnerable sites and the specific directory structure. The CVSS 3.1 base score is 5.9, reflecting a medium severity level, with a vector indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N). There are no known exploits in the wild at the time of publication, and no patches have been linked yet. This vulnerability primarily risks the confidentiality of sensitive customer data, including personal and financial information contained in invoices, which could be leveraged for identity theft, fraud, or further targeted attacks.
Potential Impact
For European organizations using WooCommerce with the affected plugin, this vulnerability poses a significant risk to customer privacy and data protection compliance, particularly under the GDPR framework. Exposure of invoice data can lead to unauthorized disclosure of personally identifiable information (PII), including names, addresses, purchase details, and potentially payment information. Such data breaches can result in regulatory penalties, reputational damage, and loss of customer trust. Additionally, exposed data could be used by threat actors for phishing campaigns or social engineering attacks targeting European customers or employees. The impact is heightened for e-commerce businesses with large customer bases or those handling sensitive transactions. Since the vulnerability allows unauthenticated access, attackers can exploit it remotely without needing credentials, increasing the risk of widespread data leakage. However, the attack complexity being high somewhat limits mass exploitation but does not eliminate targeted attacks against high-value organizations.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the 'Print Invoice & Delivery Notes for WooCommerce' plugin is installed and determine the version in use. Until an official patch is released, organizations should consider disabling the plugin or the email attachment feature that stores invoices in the vulnerable directory. Restricting access to the '/wp-content/uploads/wcdn/invoice' directory via web server configuration (e.g., using .htaccess rules for Apache or equivalent for Nginx) to deny public access is a critical temporary mitigation. Implementing authentication or IP-based restrictions on this directory can also reduce exposure. Monitoring web server logs for suspicious access attempts to the 'wcdn/invoice' path can help detect exploitation attempts. Organizations should also review and enhance their data retention policies to minimize sensitive data storage duration. Once a patch is available, prompt application of updates is essential. Additionally, informing customers about potential data exposure and preparing incident response plans aligned with GDPR breach notification requirements is advisable.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-22T22:57:04.770Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6c6b
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/4/2025, 9:55:36 PM
Last updated: 1/7/2026, 6:10:51 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.