CVSS 3.1 Score 7.6 of 10 (high)


Published May 17, 2024


CVE-2023-35881 is a vulnerability categorized as "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" affecting WooCommerce One Page Checkout versions up to 2.3.0. This vulnerability allows for PHP Local File Inclusion, potentially exposing sensitive files on the affected system. The risk score for this vulnerability is 26, with a base severity of HIGH and base score of 7.6 according to [email protected]. The exploitability score is 2.8, and the vector string is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L. It has been determined that the privileges required to exploit this vulnerability are LOW, and there is no user interaction required. The attack vector is through the network, and the impact on integrity is low but on confidentiality is high. The availability impact is also low. Remediation steps have not been provided at this time, and no further analysis has been conducted so far regarding this vulnerability.

Leverage our Vulnerability Intelligence module to secure your systems now - get detailed insights on CVE-2024-37364. Book your demo today.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-35881 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options