Directory Traversal Vulnerability in Media File Manager Plugin for WordPress
CVE-2018-19042
5.3MEDIUM
Summary
The Media File Manager plugin for WordPress has a vulnerability that allows an attacker to execute arbitrary file movements through the use of directory traversal. By manipulating the dir_from and dir_to parameters in the mrelocator_move action, an attacker can exploit this vulnerability through the wp-admin/admin-ajax.php endpoint. This could lead to unauthorized file access and potential data compromise.
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved