Impact
Bit Assist for WordPress is vulnerable to a path traversal flaw that allows an authenticated attacker with a Subscriber role or higher to access arbitrary files via the fileID parameter. This flaw enables the attacker to read sensitive files on the server, potentially exposing credentials, configuration data, or other confidential information. The vulnerability is identified as a classic directory traversal weakness and is further classified under CWE-22 and CWE-23.
Affected Systems
WordPress installations running the Bit Assist plugin version 1.5.2 or earlier are affected. The vulnerability applies to all releases up to and including 1.5.2, regardless of the site’s theme or other plugins. Users of the bitapps Bit Assist plugin with Subscriber‑level or higher privileges are at risk.
Risk and Exploitability
The CVSS base score of 6.5 indicates a medium severity level, and the EPSS score of less than 1% suggests a very low probability of exploitation at the time of assessment. The vulnerability is not currently listed in the CISA KEV catalog. The likely attack vector requires authentication, specifically a Subscriber or higher role, but once authenticated the attacker can freely read any file on the server through crafted fileID values.
OpenCVE Enrichment
EUVD