Impact
The vulnerability in the LambertGroup CLEVER plugin is a Path Traversal flaw (CWE‑22) that allows an attacker to download arbitrary files from the server. Because the plugin does not properly limit pathname resolution, a crafted request can read any file the web server can access, resulting in confidentiality exposure of sensitive data.
Affected Systems
LambertGroup CLEVER plugin versions from n/a through 2.6 are affected. The plugin is distributed under the identifier lbg-audio11-html5-shoutcast_history and is used as a WordPress plugin. Any WordPress installation that includes this plugin with a version 2.6 or earlier faces this issue.
Risk and Exploitability
This flaw carries a CVSS score of 7.5, indicating a high severity. The EPSS score is below 1%, suggesting a low current exploitation probability, and it is not listed in the CISA Known Exploited Vulnerabilities catalog. The most likely attack vector is a web‑based request to the plugin’s download endpoint, where an attacker supplies a path containing directory‑traversal sequences to reference files outside the intended directory. Successful exploitation would grant the attacker read access to any file the web server can access, without requiring authentication if the endpoint is publicly reachable.
OpenCVE Enrichment
EUVD