Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4cqh-mqrw-7qqg

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Theme Editor WordPress plugin before 2.6 did not validate the GET file parameter before passing it to the download_file() function, allowing administrators to download arbitrary files on the web server, such as /etc/passwd

The Theme Editor WordPress plugin before 2.6 did not validate the GET file parameter before passing it to the download_file() function, allowing administrators to download arbitrary files on the web server, such as /etc/passwd

EPSS

Процентиль: 68%
0.00576
Низкий

Дефекты

CWE-552

Связанные уязвимости

CVSS3: 4.9
nvd
почти 5 лет назад

The Theme Editor WordPress plugin before 2.6 did not validate the GET file parameter before passing it to the download_file() function, allowing administrators to download arbitrary files on the web server, such as /etc/passwd

EPSS

Процентиль: 68%
0.00576
Низкий

Дефекты

CWE-552