Path Traversal Vulnerability Affects Automatic from n/a through 3.92.0
CVE-2024-27954
Key Information:
Badges
Summary
The WP Automatic plugin developed by Automatic is impacted by a vulnerability that allows for improper limitation of a pathname to a restricted directory, leading to potential path traversal exploitation. This vulnerability can enable unauthorized access to files and directories that should be restricted, increasing the risk of server-side request forgery (SSRF) attacks, which can further compromise system integrity and data confidentiality. The affected versions include WP Automatic up to and including 3.92.0, highlighting the urgency for users to apply necessary patches or updates to mitigate associated risks.
Affected Version(s)
Automatic <= 3.92.0
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles

WordPress Automatic Plugin <3.92.1 - Arbitrary File Download and SSRF (CVE-2022-1970)
WordPress Automatic plugin <3.92.1 is vulnerable to unauthenticated Arbitrary File Download and SSRF Located in the downloader.php file, could permit attackers to download any file from a site.
WordPress Plugin Flaw Exposes 40,000+ Websites to Cyber Attack
Automatic, developed by Valve Press, has been found to harbor critical security vulnerabilities that put over 40k websites at risk.
References
EPSS Score
93% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
Vulnerability published
- 📰
First article discovered by GBHackers on Security
Vulnerability Reserved