Skip to main content

CVE-2024-13640: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in tychesoftwares Print Invoice & Delivery Notes for WooCommerce

Medium
VulnerabilityCVE-2024-13640cvecve-2024-13640cwe-200
Published: Sat Mar 08 2025 (03/08/2025, 04:21:03 UTC)
Source: CVE
Vendor/Project: tychesoftwares
Product: Print Invoice & Delivery Notes for WooCommerce

Description

The Print Invoice & Delivery Notes for WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.4.1 via the 'wcdn/invoice' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/wcdn/invoice directory which can contain invoice files if an email attachment setting is enabled.

AI-Powered Analysis

AILast updated: 07/04/2025, 21:55:36 UTC

Technical Analysis

CVE-2024-13640 is a medium-severity vulnerability affecting the 'Print Invoice & Delivery Notes for WooCommerce' WordPress plugin developed by tychesoftwares. This vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. The issue affects all versions up to and including 5.4.1 of the plugin. The root cause lies in the insecure storage and access control of invoice files within the '/wp-content/uploads/wcdn/invoice' directory. When the plugin's email attachment setting is enabled, invoice files containing sensitive customer and transaction data are saved in this directory without proper access restrictions. This misconfiguration allows unauthenticated attackers to directly access and download these invoice files by navigating to the 'wcdn/invoice' directory on the affected WordPress site. The vulnerability does not require any authentication or user interaction, but the attack complexity is rated high due to the need to identify vulnerable sites and the specific directory structure. The CVSS 3.1 base score is 5.9, reflecting a medium severity level, with a vector indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N). There are no known exploits in the wild at the time of publication, and no patches have been linked yet. This vulnerability primarily risks the confidentiality of sensitive customer data, including personal and financial information contained in invoices, which could be leveraged for identity theft, fraud, or further targeted attacks.

Potential Impact

For European organizations using WooCommerce with the affected plugin, this vulnerability poses a significant risk to customer privacy and data protection compliance, particularly under the GDPR framework. Exposure of invoice data can lead to unauthorized disclosure of personally identifiable information (PII), including names, addresses, purchase details, and potentially payment information. Such data breaches can result in regulatory penalties, reputational damage, and loss of customer trust. Additionally, exposed data could be used by threat actors for phishing campaigns or social engineering attacks targeting European customers or employees. The impact is heightened for e-commerce businesses with large customer bases or those handling sensitive transactions. Since the vulnerability allows unauthenticated access, attackers can exploit it remotely without needing credentials, increasing the risk of widespread data leakage. However, the attack complexity being high somewhat limits mass exploitation but does not eliminate targeted attacks against high-value organizations.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify if the 'Print Invoice & Delivery Notes for WooCommerce' plugin is installed and determine the version in use. Until an official patch is released, organizations should consider disabling the plugin or the email attachment feature that stores invoices in the vulnerable directory. Restricting access to the '/wp-content/uploads/wcdn/invoice' directory via web server configuration (e.g., using .htaccess rules for Apache or equivalent for Nginx) to deny public access is a critical temporary mitigation. Implementing authentication or IP-based restrictions on this directory can also reduce exposure. Monitoring web server logs for suspicious access attempts to the 'wcdn/invoice' path can help detect exploitation attempts. Organizations should also review and enhance their data retention policies to minimize sensitive data storage duration. Once a patch is available, prompt application of updates is essential. Additionally, informing customers about potential data exposure and preparing incident response plans aligned with GDPR breach notification requirements is advisable.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-22T22:57:04.770Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6c6b

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/4/2025, 9:55:36 PM

Last updated: 7/26/2025, 3:20:45 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats