Bit Assist plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.2 via the downloadResponseFile() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Metrics
Affected Vendors & Products
References
History
Tue, 25 Feb 2025 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Bitapps
Bitapps bit Assist |
|
Weaknesses | CWE-22 | |
CPEs | cpe:2.3:a:bitapps:bit_assist:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Bitapps
Bitapps bit Assist |
Fri, 14 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 14 Feb 2025 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Bit Assist plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.2 via the downloadResponseFile() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. | |
Title | Bit Assist <= 1.5.2 - Path Traversal to Authenticated (Administrator+) Arbitrary File Read via downloadResponseFile Function | |
Weaknesses | CWE-23 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-02-14T16:42:43.715Z
Reserved: 2025-01-29T19:56:49.186Z
Link: CVE-2024-13791

Updated: 2025-02-14T16:42:38.763Z

Status : Analyzed
Published: 2025-02-14T11:15:09.320
Modified: 2025-02-25T04:01:52.803
Link: CVE-2024-13791

No data.