CVE-2024-6687
CTT Expresso para WooCommerce <= 3.2.12 - Information Exposure via Unprotected Directory
CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th
The CTT Expresso para WooCommerce plugin for WordPress is vulnerable to sensitive information exposure in all versions up to and including 3.2.12 via the /wp-content/uploads/cepw directory. The generated .pdf and log files are publicly accessible and contain sensitive information such as sender and receiver names, phone numbers, physical addresses, and email addresses
| CWE | CWE-200 |
| Vendor | limpinho |
| Product | ctt expresso para woocommerce |
| Published | Aug 1, 2024 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for limpinho ctt expresso para woocommerce
Be the first to know when new medium vulnerabilities affecting limpinho ctt expresso para woocommerce are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
limpinho / CTT Expresso para WooCommerce
0 โค 3.2.12
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/13088645-8233-40fb-8755-cbdf44c0eaf7?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3127496%40ctt-expresso-para-woocommerce&new=3127496%40ctt-expresso-para-woocommerce&sfp_email=&sfph_mail=#file25
Credits
Ricardo Silva