4.9
CVE-2021-24154
- EPSS 0.58%
- Veröffentlicht 05.04.2021 19:15:14
- Zuletzt bearbeitet 21.11.2024 05:52:28
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
Theme Editor <= 2.5 - Authenticated Arbitrary File Download
The Theme Editor WordPress plugin before 2.6 did not validate the GET file parameter before passing it to the download_file() function, allowing administrators to download arbitrary files on the web server, such as /etc/passwd
Mögliche Gegenmaßnahme
Theme Editor: Update to version 2.6, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Theme Editor
Version
*-2.5
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Themeeditor ≫ Theme Editor SwPlatformwordpress Version < 2.6
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.58% | 0.679 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.9 | 1.2 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
|
| nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:P/I:N/A:N
|
CWE-552 Files or Directories Accessible to External Parties
The product makes files or directories accessible to unauthorized actors, even though they should not be.