Access violation vulnerability in eMagicOne Store Manager for WooCommerce 1.2.5

The eMagicOne Store Manager for WooCommerce plugin for WordPress has a security vulnerability that allows unauthenticated attackers to read the contents of any file on the server, including sensitive information. This can only happen if the plugin’s default password (1:1) is not changed or if the attacker gains access to the login credentials.

Detected in:

eMagicOne Store Manager for WooCommerce fixed vulnerable versions: >= * <= 1.2.5

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.