CVSS 3.1 Score 2.7 of 10 (low)


Published Sep 4, 2023
Updated: Nov 7, 2023


CVE-2023-4216 is a vulnerability found in the Orders Tracking for WooCommerce WordPress plugin before version 1.2.6. This vulnerability allows high privilege users with the manage_woocommerce capability to access any file on the web server through a Traversal attack by exploiting the file_url parameter when importing a CSV file. However, the content that can be retrieved is limited to only the first line of the file. This vulnerability has a risk score of 10 and a base severity rating of LOW according to NIST's National Vulnerability Database (NVD). The affected products include various versions of snLzR0, snLzR1, snLzR2, lcxSEf, and other related products. To remediate this vulnerability, users should update the Orders Tracking for WooCommerce WordPress plugin to version 1.2.6 or higher to ensure that proper validation is performed on the file_url parameter during CSV imports.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-4216 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options