CVE-2025-48124: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light allows Path Traversal. This issue affects Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light: from n/a through 2.4.37.
AI Analysis
Technical Summary
CVE-2025-48124 is a high-severity path traversal vulnerability (CWE-22) affecting the Holest Engineering Spreadsheet Price Changer plugin for WooCommerce and WP E-commerce – Light, versions up to 2.4.37. This vulnerability arises from improper limitation of pathname inputs, allowing an attacker to craft requests that traverse directories outside the intended restricted directory. Exploiting this flaw, an unauthenticated remote attacker can access arbitrary files on the web server hosting the vulnerable plugin. The CVSS 3.1 base score of 7.5 reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), with a high impact on confidentiality (C:H) but no impact on integrity or availability. This means sensitive files such as configuration files, credentials, or other sensitive data stored on the server could be disclosed without authentication. Since the vulnerability affects a plugin used in WooCommerce and WP E-commerce – Light, which are popular e-commerce platforms on WordPress, the attack surface includes numerous online stores that rely on this plugin for bulk price management. The lack of a patch link indicates that no official fix has been released yet, increasing the urgency for mitigation. No known exploits are reported in the wild at this time, but the ease of exploitation and high confidentiality impact make this a significant threat to affected sites.
Potential Impact
For European organizations running WooCommerce or WP E-commerce stores using the vulnerable Spreadsheet Price Changer plugin, this vulnerability poses a serious risk of unauthorized disclosure of sensitive business and customer data. Confidential information such as pricing strategies, customer details, API keys, or payment configuration files could be exposed, leading to potential financial loss, reputational damage, and regulatory non-compliance (e.g., GDPR violations). Retailers and e-commerce service providers are particularly at risk, as attackers could leverage disclosed data for fraud or competitive advantage. The vulnerability's network accessibility and lack of authentication requirements mean attackers can exploit it remotely without user interaction, increasing the likelihood of automated scanning and exploitation attempts. Additionally, compromised data confidentiality could facilitate further attacks such as phishing or supply chain compromises. Given the widespread use of WooCommerce in Europe, the impact could be broad, affecting small to large enterprises engaged in online commerce.
Mitigation Recommendations
Immediate mitigation steps include disabling or removing the vulnerable Spreadsheet Price Changer plugin until a vendor patch is available. If removal is not feasible, restrict access to the plugin’s directories and files via web server configuration (e.g., .htaccess rules or Nginx directives) to prevent unauthorized HTTP requests that could trigger path traversal. Implement Web Application Firewall (WAF) rules to detect and block path traversal patterns such as '../' sequences in URLs or parameters associated with the plugin. Regularly monitor web server logs for suspicious access attempts targeting the plugin paths. Additionally, ensure that file system permissions are properly configured to limit the web server’s read access only to necessary directories, minimizing the impact of any traversal attempts. Organizations should subscribe to vendor advisories and Patchstack updates to apply official patches promptly once released. Finally, conduct security awareness training for administrators to recognize and respond to signs of exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-48124: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light
Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light allows Path Traversal. This issue affects Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light: from n/a through 2.4.37.
AI-Powered Analysis
Technical Analysis
CVE-2025-48124 is a high-severity path traversal vulnerability (CWE-22) affecting the Holest Engineering Spreadsheet Price Changer plugin for WooCommerce and WP E-commerce – Light, versions up to 2.4.37. This vulnerability arises from improper limitation of pathname inputs, allowing an attacker to craft requests that traverse directories outside the intended restricted directory. Exploiting this flaw, an unauthenticated remote attacker can access arbitrary files on the web server hosting the vulnerable plugin. The CVSS 3.1 base score of 7.5 reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), with a high impact on confidentiality (C:H) but no impact on integrity or availability. This means sensitive files such as configuration files, credentials, or other sensitive data stored on the server could be disclosed without authentication. Since the vulnerability affects a plugin used in WooCommerce and WP E-commerce – Light, which are popular e-commerce platforms on WordPress, the attack surface includes numerous online stores that rely on this plugin for bulk price management. The lack of a patch link indicates that no official fix has been released yet, increasing the urgency for mitigation. No known exploits are reported in the wild at this time, but the ease of exploitation and high confidentiality impact make this a significant threat to affected sites.
Potential Impact
For European organizations running WooCommerce or WP E-commerce stores using the vulnerable Spreadsheet Price Changer plugin, this vulnerability poses a serious risk of unauthorized disclosure of sensitive business and customer data. Confidential information such as pricing strategies, customer details, API keys, or payment configuration files could be exposed, leading to potential financial loss, reputational damage, and regulatory non-compliance (e.g., GDPR violations). Retailers and e-commerce service providers are particularly at risk, as attackers could leverage disclosed data for fraud or competitive advantage. The vulnerability's network accessibility and lack of authentication requirements mean attackers can exploit it remotely without user interaction, increasing the likelihood of automated scanning and exploitation attempts. Additionally, compromised data confidentiality could facilitate further attacks such as phishing or supply chain compromises. Given the widespread use of WooCommerce in Europe, the impact could be broad, affecting small to large enterprises engaged in online commerce.
Mitigation Recommendations
Immediate mitigation steps include disabling or removing the vulnerable Spreadsheet Price Changer plugin until a vendor patch is available. If removal is not feasible, restrict access to the plugin’s directories and files via web server configuration (e.g., .htaccess rules or Nginx directives) to prevent unauthorized HTTP requests that could trigger path traversal. Implement Web Application Firewall (WAF) rules to detect and block path traversal patterns such as '../' sequences in URLs or parameters associated with the plugin. Regularly monitor web server logs for suspicious access attempts targeting the plugin paths. Additionally, ensure that file system permissions are properly configured to limit the web server’s read access only to necessary directories, minimizing the impact of any traversal attempts. Organizations should subscribe to vendor advisories and Patchstack updates to apply official patches promptly once released. Finally, conduct security awareness training for administrators to recognize and respond to signs of exploitation.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-15T18:01:28.792Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f581b0bd07c3938a886
Added to database: 6/10/2025, 6:54:16 PM
Last enriched: 7/11/2025, 1:47:14 AM
Last updated: 1/7/2026, 4:23:41 AM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.