Overview
This report provides an in-depth analysis of CVE-2025-48124, a serious Path Traversal vulnerability identified in Holest Engineering’s Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light. This vulnerability could potentially lead to system compromise or data leakage, critically affecting businesses that rely on these tools for their e-commerce activities.
Vulnerability Summary
CVE ID: CVE-2025-48124
Severity: High (7.5)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise and data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
Spreadsheet Price Changer for WooCommerce | n/a through 2.4.37
WP E-commerce – Light | n/a through 2.4.37
How the Exploit Works
The vulnerability allows an attacker to manipulate file or directory paths to gain unauthorized access to restricted areas of the system. This is accomplished through the misuse of the application’s failure to properly validate or sanitize user input, allowing the attacker to point to any arbitrary directory or file on the system.
Conceptual Example Code
Below is a conceptual example of how this vulnerability might be exploited. The attacker could input a path traversal string such as “../../../etc/passwd” to gain access to sensitive system files.
GET /file?filename=../../../etc/passwd HTTP/1.1
Host: target.example.com
Mitigation Guidance
To mitigate this vulnerability, users are advised to apply the vendor-supplied patch as soon as possible. If the patch cannot be applied immediately, use a Web Application Firewall (WAF) or Intrusion Detection System (IDS) as a temporary mitigation.

