Access violation vulnerability in eMagicOne Store Manager for WooCommerce 1.2.5

The eMagicOne Store Manager for WooCommerce plugin for WordPress has a security vulnerability that allows unauthorized individuals to delete any file on the server. This could potentially lead to hackers being able to execute code on the server by deleting important files, such as wp-config.php. This can only happen if the plugin is using the default password or if the hacker gains access to login credentials.

Detected in:

eMagicOne Store Manager for WooCommerce fixed vulnerable versions: >= * <= 1.2.5

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.