Lucene search

K
wpvulndbWpvulndbWPVDB-ID:3CCC6D5C-5823-4211-9F7E-9763B1C9219E
HistoryJun 11, 2024 - 12:00 a.m.

FileOrganizer < 1.0.8 - Sensitive Information Exposure via Directory Listing

2024-06-1100:00:00
wpscan.com
4
fileorganizer plugin wordpress sensitive information exposure directory listing vulnerability software

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.6

Confidence

Low

Description The FileOrganizer – Manage WordPress and Website Files plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.7 via the ‘fileorganizer_ajax_handler’ function. This makes it possible for unauthenticated attackers to extract sensitive data including backups or other sensitive information if the files have been moved to the built-in Trash folder.

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.6

Confidence

Low

Related for WPVDB-ID:3CCC6D5C-5823-4211-9F7E-9763B1C9219E