Arbitrary File Read Vulnerability in WP Extended Plugin
CVE-2024-8104

6.5MEDIUM

Key Information:

Vendor
WPextended
Status
The Ultimate WordPress Toolkit – WP Extended
Vendor
CVE Published:
4 September 2024

Summary

The WP Extended plugin for WordPress is affected by a directory traversal vulnerability that allows authenticated attackers, with subscriber privileges or higher, to read arbitrary files on the server. This flaw, present in all versions up to and including 3.0.8, could expose sensitive information stored in files, compromising the security of the website and its users. Proper validation and authorization checks are critical to prevent unauthorized file access and protect sensitive data.

Affected Version(s)

The Ultimate WordPress Toolkit – WP Extended * <= 3.0.8

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Marco Wotschka
.