SB2025052711 - Multiple vulnerabilities in eMagicOne Store Manager for WooCommerce plugin for WordPress



SB2025052711 - Multiple vulnerabilities in eMagicOne Store Manager for WooCommerce plugin for WordPress

Published: May 27, 2025 Updated: May 30, 2025

Security Bulletin ID SB2025052711
Severity
High
Patch available
NO
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) External Control of File Name or Path (CVE-ID: CVE-2025-4602)

The vulnerability allows a remote attacker to read arbitrary files.

The vulnerability exists due to external control of file name or path in the get_file() function. A remote attacker can read the contents of arbitrary files on the server.


2) Arbitrary file upload (CVE-ID: CVE-2025-5058)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to insufficient validation of file during file upload in the set_image() function. A remote attacker can upload a malicious file and execute it on the server.


3) External Control of File Name or Path (CVE-ID: CVE-2025-4603)

The vulnerability allows a remote attacker to delete arbitrary files.

The vulnerability exists due to insufficient file path validation in the delete_file() function. A remote attacker can delete arbitrary files on the target server.


4) Arbitrary file upload (CVE-ID: CVE-2025-4336)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to insufficient validation of file during file upload in the set_file() function. A remote attacker can upload a malicious file and execute it on the server.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.

References