Unauthorized Data Access Vulnerability in WordPress File Upload Plugin
CVE-2024-12719

4.3MEDIUM

Key Information:

Vendor
Nickboss
Status
WordPress File Upload
Vendor
CVE Published:
7 January 2025

Summary

The WordPress File Upload plugin is susceptible to unauthorized data exposure due to a missing capability check in the 'wfu_ajax_action_read_subfolders' function. This vulnerability enables authenticated users with Subscriber-level access or higher to execute limited path traversal attacks, allowing them to list directory contents and navigate through subdirectories in WordPress. However, it should be noted that direct file viewing remains unaffected.

Affected Version(s)

WordPress File Upload * <= 4.24.15

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Lucio Sá
.