Unauthorized Data Access Vulnerability in WordPress File Upload Plugin
CVE-2024-12719
4.3MEDIUM
Key Information:
- Vendor
- Nickboss
- Status
- WordPress File Upload
- Vendor
- CVE Published:
- 7 January 2025
Summary
The WordPress File Upload plugin is susceptible to unauthorized data exposure due to a missing capability check in the 'wfu_ajax_action_read_subfolders' function. This vulnerability enables authenticated users with Subscriber-level access or higher to execute limited path traversal attacks, allowing them to list directory contents and navigate through subdirectories in WordPress. However, it should be noted that direct file viewing remains unaffected.
Affected Version(s)
WordPress File Upload * <= 4.24.15
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Lucio Sá