The MIPL WC Multisite Sync plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.1.5 via the 'mipl_wc_sync_download_log' action. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Jan 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 07 Jan 2025 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The MIPL WC Multisite Sync plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.1.5 via the 'mipl_wc_sync_download_log' action. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. | |
Title | MIPL WC Multisite Sync <= 1.1.5 - Unauthenticated Arbitrary File Download | |
Weaknesses | CWE-22 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-01-07T09:22:15.610Z
Updated: 2025-01-07T16:11:24.559Z
Reserved: 2024-12-04T13:49:47.314Z
Link: CVE-2024-12152
Vulnrichment
Updated: 2025-01-07T15:55:33.033Z
NVD
Status : Received
Published: 2025-01-07T10:15:06.577
Modified: 2025-01-07T10:15:06.577
Link: CVE-2024-12152
Redhat
No data.