CVE-2025-48317: CWE-35 Path Traversal in Stefan Keller WooCommerce Payment Gateway for Saferpay
Path Traversal vulnerability in Stefan Keller WooCommerce Payment Gateway for Saferpay allows Path Traversal. This issue affects WooCommerce Payment Gateway for Saferpay: from n/a through 0.4.9.
AI Analysis
Technical Summary
CVE-2025-48317 is a high-severity path traversal vulnerability (CWE-35) identified in the Stefan Keller WooCommerce Payment Gateway for Saferpay plugin. This plugin integrates the Saferpay payment system into WooCommerce, a widely used e-commerce platform on WordPress. The vulnerability allows an unauthenticated attacker to perform a path traversal attack remotely (AV:N/AC:L/PR:N/UI:N), meaning no privileges or user interaction are required. By exploiting this flaw, an attacker can manipulate file path parameters to access arbitrary files on the web server outside the intended directories. This can lead to unauthorized disclosure of sensitive information such as configuration files, credentials, or other critical data stored on the server. The CVSS 3.1 base score of 7.5 reflects the high confidentiality impact, with no impact on integrity or availability. The vulnerability affects all versions of the plugin up to 0.4.9, with no patch currently available. Although no known exploits are reported in the wild yet, the ease of exploitation and the critical nature of the data potentially exposed make this a significant threat to websites using this payment gateway. Since WooCommerce is a popular e-commerce solution, and payment gateways handle sensitive financial data, this vulnerability poses a serious risk to online stores relying on this plugin for Saferpay integration.
Potential Impact
For European organizations, especially e-commerce businesses using WooCommerce with the Stefan Keller Saferpay payment gateway, this vulnerability could lead to unauthorized disclosure of sensitive customer and payment data. This compromises customer privacy and can result in financial fraud, regulatory non-compliance (e.g., GDPR violations), and reputational damage. The exposure of configuration files or credentials could also facilitate further attacks, including full server compromise or lateral movement within the network. Given the critical role of payment gateways in processing transactions, exploitation could undermine trust in affected merchants and disrupt business operations. Additionally, the lack of authentication and user interaction requirements means attackers can automate exploitation attempts at scale, increasing the risk of widespread data breaches across European e-commerce platforms.
Mitigation Recommendations
Immediate mitigation steps include: 1) Temporarily disabling the Stefan Keller WooCommerce Payment Gateway for Saferpay plugin until a patch is released. 2) Restricting access to sensitive directories and files on the web server via web server configuration (e.g., .htaccess rules or equivalent) to prevent unauthorized file access. 3) Implementing Web Application Firewall (WAF) rules to detect and block path traversal attack patterns targeting the plugin's endpoints. 4) Monitoring web server logs for suspicious requests containing path traversal payloads (e.g., ../ sequences). 5) Applying the principle of least privilege to the web server user to limit file system access. 6) Keeping WooCommerce and all plugins updated and subscribing to vendor security advisories for prompt patch deployment once available. 7) Conducting a security audit of the e-commerce environment to identify and remediate any additional vulnerabilities or misconfigurations that could be exploited in conjunction with this issue.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-48317: CWE-35 Path Traversal in Stefan Keller WooCommerce Payment Gateway for Saferpay
Description
Path Traversal vulnerability in Stefan Keller WooCommerce Payment Gateway for Saferpay allows Path Traversal. This issue affects WooCommerce Payment Gateway for Saferpay: from n/a through 0.4.9.
AI-Powered Analysis
Technical Analysis
CVE-2025-48317 is a high-severity path traversal vulnerability (CWE-35) identified in the Stefan Keller WooCommerce Payment Gateway for Saferpay plugin. This plugin integrates the Saferpay payment system into WooCommerce, a widely used e-commerce platform on WordPress. The vulnerability allows an unauthenticated attacker to perform a path traversal attack remotely (AV:N/AC:L/PR:N/UI:N), meaning no privileges or user interaction are required. By exploiting this flaw, an attacker can manipulate file path parameters to access arbitrary files on the web server outside the intended directories. This can lead to unauthorized disclosure of sensitive information such as configuration files, credentials, or other critical data stored on the server. The CVSS 3.1 base score of 7.5 reflects the high confidentiality impact, with no impact on integrity or availability. The vulnerability affects all versions of the plugin up to 0.4.9, with no patch currently available. Although no known exploits are reported in the wild yet, the ease of exploitation and the critical nature of the data potentially exposed make this a significant threat to websites using this payment gateway. Since WooCommerce is a popular e-commerce solution, and payment gateways handle sensitive financial data, this vulnerability poses a serious risk to online stores relying on this plugin for Saferpay integration.
Potential Impact
For European organizations, especially e-commerce businesses using WooCommerce with the Stefan Keller Saferpay payment gateway, this vulnerability could lead to unauthorized disclosure of sensitive customer and payment data. This compromises customer privacy and can result in financial fraud, regulatory non-compliance (e.g., GDPR violations), and reputational damage. The exposure of configuration files or credentials could also facilitate further attacks, including full server compromise or lateral movement within the network. Given the critical role of payment gateways in processing transactions, exploitation could undermine trust in affected merchants and disrupt business operations. Additionally, the lack of authentication and user interaction requirements means attackers can automate exploitation attempts at scale, increasing the risk of widespread data breaches across European e-commerce platforms.
Mitigation Recommendations
Immediate mitigation steps include: 1) Temporarily disabling the Stefan Keller WooCommerce Payment Gateway for Saferpay plugin until a patch is released. 2) Restricting access to sensitive directories and files on the web server via web server configuration (e.g., .htaccess rules or equivalent) to prevent unauthorized file access. 3) Implementing Web Application Firewall (WAF) rules to detect and block path traversal attack patterns targeting the plugin's endpoints. 4) Monitoring web server logs for suspicious requests containing path traversal payloads (e.g., ../ sequences). 5) Applying the principle of least privilege to the web server user to limit file system access. 6) Keeping WooCommerce and all plugins updated and subscribing to vendor security advisories for prompt patch deployment once available. 7) Conducting a security audit of the e-commerce environment to identify and remediate any additional vulnerabilities or misconfigurations that could be exploited in conjunction with this issue.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-19T14:13:53.900Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bb0d9ee11b59d9ac04ed4c
Added to database: 9/5/2025, 4:19:42 PM
Last enriched: 9/12/2025, 11:50:58 PM
Last updated: 10/17/2025, 11:49:17 PM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62655: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in The Wikimedia Foundation MediaWiki Cargo extension
LowCVE-2025-62654: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation MediaWiki QuizGame extension
LowCVE-2025-62652: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation MediaWiki WebAuthn extension
MediumCVE-2025-62645: CWE-266 Incorrect Privilege Assignment in Restaurant Brands International assistant platform
CriticalCVE-2025-62644: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Restaurant Brands International assistant platform
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.