Lucene search

K
cvelistPatchstackCVELIST:CVE-2024-35743
HistoryJun 10, 2024 - 4:23 p.m.

CVE-2024-35743 WordPress SC filechecker plugin <= 0.6 - Arbitrary File Deletion vulnerability

2024-06-1016:23:12
CWE-22
Patchstack
www.cve.org
1
wordpress
sc filechecker
path traversal
file deletion
vulnerability
cve-2024-35743

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

0.0005 Low

EPSS

Percentile

16.4%

Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in Siteclean SC filechecker allows Path Traversal, File Manipulation.This issue affects SC filechecker: from n/a through 0.6.

CNA Affected

[
  {
    "collectionURL": "https://wordpress.org/plugins",
    "defaultStatus": "unaffected",
    "packageName": "wp-file-checker",
    "product": "SC filechecker",
    "vendor": "Siteclean",
    "versions": [
      {
        "lessThanOrEqual": "0.6",
        "status": "affected",
        "version": "n/a",
        "versionType": "custom"
      }
    ]
  }
]

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

0.0005 Low

EPSS

Percentile

16.4%

Related for CVELIST:CVE-2024-35743