4.9
CVE-2024-12875
- EPSS 1.53%
- Veröffentlicht 21.12.2024 12:15:20
- Zuletzt bearbeitet 07.02.2025 17:09:37
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Easy Digital Downloads <= 3.3.2 - Authenticated (Admin+) Arbitrary File Download
The Easy Digital Downloads – eCommerce Payments and Subscriptions made easy plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.3.2 via the file download functionality. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Mögliche Gegenmaßnahme
Easy Digital Downloads – eCommerce Payments and Subscriptions made easy: Update to version 3.3.3, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Easy Digital Downloads – eCommerce Payments and Subscriptions made easy
Version
*-3.3.2
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Awesomemotive ≫ Easy Digital Downloads SwPlatformwordpress Version < 3.3.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.53% | 0.81 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 4.9 | 1.2 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
CWE-73 External Control of File Name or Path
The product allows user input to control or influence paths or file names that are used in filesystem operations.