[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f6JMaTnOmiKuapoqqcsOCnMGbgSt4HtbjgaitiU_rKnc":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2025-69325","primer-mydata-for-woocommerce-unauthenticated-path-traversal","Primer MyData for Woocommerce \u003C= 4.2.8 - Unauthenticated Path Traversal","The Primer MyData for Woocommerce plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 4.2.8. This makes it possible for unauthenticated attackers to perform actions on files outside of the originally intended directory.","primer-mydata",null,"\u003C=4.2.8","4.2.9","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","2026-02-09 00:00:00","2026-02-17 15:10:38",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fabeb13ac-d835-4e02-baaf-30e8dc4bd86b?source=api-prod",9]