9.8
CVE-2019-25213
- EPSS 39.58%
- Veröffentlicht 16.10.2024 07:15:05
- Zuletzt bearbeitet 30.10.2024 18:20:42
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Advanced Access Manager <= 5.9.8.1 - Unauthenticated Arbitrary File Read
The Advanced Access Manager plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Read in versions up to, and including, 5.9.8.1 due to insufficient validation on the aam-media parameter. This allows unauthenticated attackers to read any file on the server, including sensitive files such as wp-config.php
Mögliche Gegenmaßnahme
Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More: Update to version 5.9.9, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More
Version
[*, 5.9.9)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Vasyltech ≫ Advanced Access Manager SwPlatformwordpress Version <= 5.9.8.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 39.58% | 0.971 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
| security@wordfence.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.