Bit Assist plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.2 via the fileID Parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Feb 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Bitapps
Bitapps bit Assist |
|
Weaknesses | CWE-22 | |
CPEs | cpe:2.3:a:bitapps:bit_assist:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Bitapps
Bitapps bit Assist |
Tue, 18 Feb 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 15 Feb 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Bit Assist plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.2 via the fileID Parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. | |
Title | Bit Assist <= 1.5.2 - Path Traversal to Authenticated (Subscriber+) Arbitrary File Read via fileID Parameter | |
Weaknesses | CWE-23 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-02-18T19:35:54.973Z
Reserved: 2025-01-29T01:02:46.838Z
Link: CVE-2025-0822

Updated: 2025-02-18T16:41:43.681Z

Status : Analyzed
Published: 2025-02-15T13:15:28.847
Modified: 2025-02-24T12:36:46.670
Link: CVE-2025-0822

No data.