The BuddyPress plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 14.1.0 via the id parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory and enables file uploads to directories outside of the web root. Depending on server configuration it may be possible to upload files with double extensions. This vulnerability only affects Windows.
History

Fri, 25 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Buddypress
Buddypress buddypress
CPEs cpe:2.3:a:buddypress:buddypress:*:*:*:*:*:wordpress:*:*
Vendors & Products Buddypress
Buddypress buddypress
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 25 Oct 2024 07:00:00 +0000

Type Values Removed Values Added
Description The BuddyPress plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 14.1.0 via the id parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory and enables file uploads to directories outside of the web root. Depending on server configuration it may be possible to upload files with double extensions. This vulnerability only affects Windows.
Title BuddyPress <= 14.1.0 - Authenticated (Subscriber+) Directory Traversal
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-10-25T06:51:24.333Z

Updated: 2024-10-25T14:11:50.388Z

Reserved: 2024-10-15T21:48:03.764Z

Link: CVE-2024-10011

cve-icon Vulnrichment

Updated: 2024-10-25T14:11:44.987Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-25T07:15:02.637

Modified: 2024-11-06T16:01:39.573

Link: CVE-2024-10011

cve-icon Redhat

No data.