CVE-2025-14301
Unknown Unknown - Not Provided
Path Traversal in Opvius AI WooCommerce Plugin Allows File Access

Publication date: 2026-01-14

Last updated on: 2026-01-14

Assigner: Wordfence

Description
The Integration Opvius AI for WooCommerce plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.3.0. This is due to the `process_table_bulk_actions()` function processing user-supplied file paths without authentication checks, nonce verification, or path validation. This makes it possible for unauthenticated attackers to delete or download arbitrary files on the server via the `wsaw-log[]` POST parameter, which can be leveraged to delete critical files like `wp-config.php` or read sensitive configuration files.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-14
Last Modified
2026-01-14
Generated
2026-05-07
AI Q&A
2026-01-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
woosa ai_for_woocommerce to 1.3.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Path Traversal issue in the Integration Opvius AI for WooCommerce WordPress plugin (versions up to 1.3.0). It occurs because the function process_table_bulk_actions() processes user-supplied file paths without proper authentication, nonce verification, or path validation. This allows unauthenticated attackers to delete or download arbitrary files on the server by manipulating the wsaw-log[] POST parameter, potentially accessing or removing critical files like wp-config.php or other sensitive configuration files. [2]


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized deletion or downloading of arbitrary files on the server. Attackers can delete critical files such as wp-config.php, which can break the website or cause data loss. They can also read sensitive configuration files, potentially exposing database credentials or other confidential information. Overall, it can lead to website downtime, data breaches, and compromise of the server's integrity. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unauthorized POST requests to the WordPress admin area that include the `wsaw-log[]` parameter used in bulk actions for log file deletion or download. Specifically, look for POST requests targeting the process_table_bulk_actions function without proper authentication or nonce verification. Commands to detect such activity could include using web server access logs to grep for suspicious POST requests, for example: `grep -i 'wsaw-log' /var/log/apache2/access.log` or `grep -i 'wsaw-log' /var/log/nginx/access.log`. Additionally, monitoring for unexpected deletions or downloads of files like `wp-config.php` or log files in the plugin's logs directory could indicate exploitation attempts. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the Woosa AI for WooCommerce plugin to a version later than 1.3.0 where this vulnerability is fixed. If an update is not available, restrict access to the WordPress admin area and the plugin's log management endpoints by implementing authentication and nonce verification. Additionally, monitor and restrict POST requests containing the `wsaw-log[]` parameter to prevent unauthenticated file deletion or download. As a temporary measure, consider disabling or removing the vulnerable plugin until a patch is applied. [2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows unauthenticated attackers to delete or download arbitrary files on the server, including sensitive configuration files such as wp-config.php. Such unauthorized access and potential exposure or deletion of sensitive data can lead to violations of data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive information against unauthorized access and ensuring data integrity. Therefore, this vulnerability negatively impacts compliance with these common standards and regulations by exposing sensitive data to risk and undermining data security controls.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart