LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-32522

CVE-2026-32522 - Vulnerability Analysis

HighCVSS: 8.6

Last Updated: March 26, 2026

vanquish WooCommerce Support Ticket System - Path Traversal

Published: March 25, 2026Updated: March 26, 2026Remote Exploitable

Overview

vanquish WooCommerce Support Ticket System < 18.5 contains a path traversal caused by improper limitation of a pathname to a restricted directory, letting attackers access unauthorized files, exploit requires no special privileges.

Severity & Score

Severity: High
CVSS Score: 8.6
EPSS Score: 4.8%(Probability of exploitation in next 30 days)

Impact

Attackers can access unauthorized files, potentially exposing sensitive information or system files.

Mitigation

Update to version 18.5 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 27, 2026

🟠 CVE-2026-32522 - High (8.6) Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in vanquish WooCommerce Support Ticket System woocommerce-support-ticket-system allows Path Traversal.This issue affects WooCommerce Support Ticket System... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-32522/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-32522
Severity
High
CVSS Score
8.6
Type
path_traversal
Status
new
EPSS
4.8%
Social Posts
1

CWE

  • CWE-22

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

EPSS Score

4.8%Probability of exploitation in the next 30 days