- Description
- The MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to Limited Local File Inclusion in all versions up to, and including, 4.2.14 via the tabname parameter. This makes it possible for unauthenticated attackers to include PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included
- Source
- security@wordfence.com
- NVD status
- Received
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- security@wordfence.com
- CWE-22
- Hype score
- Not currently trending
[CVE-2025-0493]:(CVSS:9.8, Severity: Critical, More Details: https://t.co/1zBWa902fE ) MultiVendorX plugin <=4.2.14 vulnerable to Local File Inclusion via 'tabname' parameter. Unauthenticated attackers can include PHP files, leading to potential code execution.
@y1659rsgh
31 Jan 2025
7 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-0493 The MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to Limited Local File Inclusion in all versions up to, … https://t.co/DcG2yuBAj6
@CVEnew
31 Jan 2025
323 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-0493: CRITICAL] Attention! Vulnerability discovered in MultiVendorX plugin for WordPress versions up to 4.2.14. Exploiting it can lead to PHP code execution and data theft. Update your plugin immediately...#cybersecurity,#vulnerability https://t.co/OPAonTUcju https://t.
@CveFindCom
31 Jan 2025
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes