Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-33519 | The InfiniteWP Client plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.13.0 via the 'historyID' parameter of the ~/debug-chart/index.php file. This makes it possible for unauthenticated attackers to read .txt files outside of the intended directory. |
Wed, 26 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Revmakx
Revmakx infinitewp Client |
|
| CPEs | cpe:2.3:a:revmakx:infinitewp_client:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Revmakx
Revmakx infinitewp Client |
Wed, 08 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Jan 2025 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The InfiniteWP Client plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.13.0 via the 'historyID' parameter of the ~/debug-chart/index.php file. This makes it possible for unauthenticated attackers to read .txt files outside of the intended directory. | |
| Title | InfiniteWP Client <= 1.13.0 - Unauthenticated Limited Directory Traversal to Arbitrary .txt File Reading | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:51:22.809Z
Reserved: 2024-10-31T13:58:35.328Z
Link: CVE-2024-10585
Updated: 2025-01-08T15:09:18.894Z
Status : Analyzed
Published: 2025-01-08T06:15:15.677
Modified: 2025-02-26T18:25:29.120
Link: CVE-2024-10585
No data.
OpenCVE Enrichment
No data.
EUVD