Skip to main content

CVE-2025-48124: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light

High
VulnerabilityCVE-2025-48124cvecve-2025-48124cwe-22
Published: Mon Jun 09 2025 (06/09/2025, 15:54:05 UTC)
Source: CVE Database V5
Vendor/Project: Holest Engineering
Product: Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light allows Path Traversal. This issue affects Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light: from n/a through 2.4.37.

AI-Powered Analysis

AILast updated: 07/11/2025, 01:47:14 UTC

Technical Analysis

CVE-2025-48124 is a high-severity path traversal vulnerability (CWE-22) affecting the Holest Engineering Spreadsheet Price Changer plugin for WooCommerce and WP E-commerce – Light, versions up to 2.4.37. This vulnerability arises from improper limitation of pathname inputs, allowing an attacker to craft requests that traverse directories outside the intended restricted directory. Exploiting this flaw, an unauthenticated remote attacker can access arbitrary files on the web server hosting the vulnerable plugin. The CVSS 3.1 base score of 7.5 reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), with a high impact on confidentiality (C:H) but no impact on integrity or availability. This means sensitive files such as configuration files, credentials, or other sensitive data stored on the server could be disclosed without authentication. Since the vulnerability affects a plugin used in WooCommerce and WP E-commerce – Light, which are popular e-commerce platforms on WordPress, the attack surface includes numerous online stores that rely on this plugin for bulk price management. The lack of a patch link indicates that no official fix has been released yet, increasing the urgency for mitigation. No known exploits are reported in the wild at this time, but the ease of exploitation and high confidentiality impact make this a significant threat to affected sites.

Potential Impact

For European organizations running WooCommerce or WP E-commerce stores using the vulnerable Spreadsheet Price Changer plugin, this vulnerability poses a serious risk of unauthorized disclosure of sensitive business and customer data. Confidential information such as pricing strategies, customer details, API keys, or payment configuration files could be exposed, leading to potential financial loss, reputational damage, and regulatory non-compliance (e.g., GDPR violations). Retailers and e-commerce service providers are particularly at risk, as attackers could leverage disclosed data for fraud or competitive advantage. The vulnerability's network accessibility and lack of authentication requirements mean attackers can exploit it remotely without user interaction, increasing the likelihood of automated scanning and exploitation attempts. Additionally, compromised data confidentiality could facilitate further attacks such as phishing or supply chain compromises. Given the widespread use of WooCommerce in Europe, the impact could be broad, affecting small to large enterprises engaged in online commerce.

Mitigation Recommendations

Immediate mitigation steps include disabling or removing the vulnerable Spreadsheet Price Changer plugin until a vendor patch is available. If removal is not feasible, restrict access to the plugin’s directories and files via web server configuration (e.g., .htaccess rules or Nginx directives) to prevent unauthorized HTTP requests that could trigger path traversal. Implement Web Application Firewall (WAF) rules to detect and block path traversal patterns such as '../' sequences in URLs or parameters associated with the plugin. Regularly monitor web server logs for suspicious access attempts targeting the plugin paths. Additionally, ensure that file system permissions are properly configured to limit the web server’s read access only to necessary directories, minimizing the impact of any traversal attempts. Organizations should subscribe to vendor advisories and Patchstack updates to apply official patches promptly once released. Finally, conduct security awareness training for administrators to recognize and respond to signs of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-15T18:01:28.792Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f581b0bd07c3938a886

Added to database: 6/10/2025, 6:54:16 PM

Last enriched: 7/11/2025, 1:47:14 AM

Last updated: 8/4/2025, 6:22:34 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats