Description


The Tainacan plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_file' function in all versions up to, and including, 0.21.7. The function is also vulnerable to directory traversal. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

Related CPE's


Weaknesses



CWE-862


CWE-862

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.5 · Medium

Information


Source identifier

[email protected]

Vulnerability status

Analyzed

Published

2024-07-31T09:15:11.010Z

1 year ago

Last modified

2025-03-07T14:33:29.970Z

10 months ago