BuddyPress plugin vulnerable to Directory Traversal on Windows
CVE-2024-10011
8.1HIGH
Summary
The BuddyPress plugin for WordPress is vulnerable to a Directory Traversal issue affecting all versions up to and including 14.1.0, specifically via the id parameter. This flaw allows authenticated attackers with Subscriber-level access or higher to execute operations on files located outside the designated directory. Consequently, this can enable file uploads to directories beyond the web root. Depending on specific server configurations, there lies a risk of files being uploaded with double extensions. Notably, this vulnerability impacts Windows environments.
Affected Version(s)
BuddyPress * <= 14.1.0
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Domons