The WordPress File Upload plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'wfu_ajax_action_read_subfolders' function in all versions up to, and including, 4.24.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform limited path traversal to view directories and subdirectories in WordPress. Files cannot be viewed.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Jan 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 07 Jan 2025 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WordPress File Upload plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'wfu_ajax_action_read_subfolders' function in all versions up to, and including, 4.24.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform limited path traversal to view directories and subdirectories in WordPress. Files cannot be viewed. | |
Title | WordPress File Upload <= 4.24.15 - Missing Authorization to Authenticated (Subscriber+) Limited Path Traversal | |
Weaknesses | CWE-862 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-01-07T09:22:14.971Z
Updated: 2025-01-07T16:11:34.092Z
Reserved: 2024-12-17T17:08:58.190Z
Link: CVE-2024-12719
Vulnrichment
Updated: 2025-01-07T15:52:05.360Z
NVD
Status : Received
Published: 2025-01-07T10:15:07.323
Modified: 2025-01-07T10:15:07.323
Link: CVE-2024-12719
Redhat
No data.