Arbitrary File Read Vulnerability in WP Extended Plugin
CVE-2024-8104
6.5MEDIUM
Key Information:
- Vendor
- WPextended
- Status
- The Ultimate WordPress Toolkit – WP Extended
- Vendor
- CVE Published:
- 4 September 2024
Summary
The WP Extended plugin for WordPress is affected by a directory traversal vulnerability that allows authenticated attackers, with subscriber privileges or higher, to read arbitrary files on the server. This flaw, present in all versions up to and including 3.0.8, could expose sensitive information stored in files, compromising the security of the website and its users. Proper validation and authorization checks are critical to prevent unauthorized file access and protect sensitive data.
Affected Version(s)
The Ultimate WordPress Toolkit – WP Extended * <= 3.0.8
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Marco Wotschka