The WooCommerce Support Ticket System plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_tmp_uploaded_file() function in all versions up to, and including, 17.7. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
History

Wed, 28 May 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Vanquish
Vanquish woocommerce Support Ticket System
CPEs cpe:2.3:a:vanquish:woocommerce_support_ticket_system:*:*:*:*:*:wordpress:*:*
Vendors & Products Vanquish
Vanquish woocommerce Support Ticket System

Tue, 12 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Support Ticket System Project
Support Ticket System Project support Ticket System
CPEs cpe:2.3:a:support_ticket_system_project:support_ticket_system:*:*:*:*:*:wordpress:*:*
Vendors & Products Support Ticket System Project
Support Ticket System Project support Ticket System
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 09 Nov 2024 03:30:00 +0000

Type Values Removed Values Added
Description The WooCommerce Support Ticket System plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_tmp_uploaded_file() function in all versions up to, and including, 17.7. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Title WooCommerce Support Ticket System <= 17.7 - Unauthenticated Arbitrary File Deletion
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-11-09T03:18:14.929Z

Updated: 2024-11-12T17:09:38.189Z

Reserved: 2024-10-31T16:37:09.098Z

Link: CVE-2024-10625

cve-icon Vulnrichment

Updated: 2024-11-12T17:08:55.394Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-09T04:15:03.393

Modified: 2025-05-28T20:49:53.980

Link: CVE-2024-10625

cve-icon Redhat

No data.