Description
The Theme Editor WordPress plugin before 2.6 did not validate the GET file parameter before passing it to the download_file() function, allowing administrators to download arbitrary files on the web server, such as /etc/passwd
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-11068 | The Theme Editor WordPress plugin before 2.6 did not validate the GET file parameter before passing it to the download_file() function, allowing administrators to download arbitrary files on the web server, such as /etc/passwd |
References
History
No history.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-03T19:21:18.397Z
Reserved: 2021-01-14T00:00:00.000Z
Link: CVE-2021-24154
No data.
Status : Modified
Published: 2021-04-05T19:15:14.640
Modified: 2024-11-21T05:52:28.910
Link: CVE-2021-24154
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD