Path Traversal Vulnerability in WP Timeline Plugin Allows PHP Local File Inclusion
CVE-2024-47324
7.5HIGH
Key Information:
- Vendor
- Ex-themes
- Status
- WP Timeline – Vertical And Horizontal Timeline Plugin
- Vendor
- CVE Published:
- 5 October 2024
Summary
A vulnerability exists within the Ex-Themes WP Timeline – Vertical and Horizontal timeline plugin for WordPress that allows for improper limitations of a pathname, leading to potential local file inclusion exploits. This security flaw can be targeted by attackers to gain unauthorized access to sensitive files on the server, thereby compromising the integrity and confidentiality of the affected systems. Versions of the plugin from n/a through 3.6.7 are affected. Users of this plugin are advised to take immediate steps to mitigate the risks associated with this vulnerability.
Affected Version(s)
WP Timeline – Vertical and Horizontal timeline plugin <= 3.6.7
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Bonds (Patchstack Alliance)