CVE-2025-48317

7.5 HIGH

📋 TL;DR

This path traversal vulnerability in the WooCommerce Payment Gateway for Saferpay plugin allows attackers to access files outside the intended directory. It affects WordPress sites using this payment gateway plugin. Attackers could potentially read sensitive files like configuration files or source code.

💻 Affected Systems

Products:
  • WooCommerce Payment Gateway for Saferpay
Versions: n/a through 0.4.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through reading sensitive configuration files containing database credentials, API keys, or other secrets that could lead to further attacks.

🟠

Likely Case

Information disclosure of sensitive files such as wp-config.php, .env files, or other configuration files containing credentials.

🟢

If Mitigated

Limited impact if proper file permissions and web server configurations restrict access to sensitive directories.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities typically have low exploitation complexity and may be exploited without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.5.0 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/woocommerce-payment-gateway-for-saferpay/vulnerability/wordpress-woocommerce-payment-gateway-for-saferpay-plugin-0-4-9-path-traversal-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'WooCommerce Payment Gateway for Saferpay'
4. Click 'Update Now' if update is available
5. If no update appears, manually download version 0.5.0+ from WordPress.org
6. Deactivate and delete old version
7. Upload and activate new version

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the plugin until patched

wp plugin deactivate woocommerce-payment-gateway-for-saferpay

Restrict file access via web server

all

Configure web server to restrict access to sensitive directories

# Add to .htaccess for Apache:
<FilesMatch "\.(php|inc|conf|config|env|sql|log|txt)$">
  Order allow,deny
  Deny from all
</FilesMatch>
# Add to nginx config:
location ~* \.(php|inc|conf|config|env|sql|log|txt)$ {
  deny all;
}

🧯 If You Can't Patch

  • Disable the WooCommerce Payment Gateway for Saferpay plugin immediately
  • Implement web application firewall (WAF) rules to block path traversal patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'WooCommerce Payment Gateway for Saferpay' version 0.4.9 or earlier

Check Version:

wp plugin get woocommerce-payment-gateway-for-saferpay --field=version

Verify Fix Applied:

Verify plugin version is 0.5.0 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in web server logs
  • Requests containing '../' sequences or encoded equivalents
  • Access attempts to sensitive files like wp-config.php

Network Indicators:

  • HTTP requests with path traversal payloads (../, ..\, encoded variants)
  • Unusual file downloads from web application

SIEM Query:

web.url:*../* AND (web.url:*wp-config* OR web.url:*.env* OR web.url:*.php*)

🔗 References

📤 Share & Export