CVE-2021-24154

The Theme Editor WordPress plugin before 2.6 did not validate the GET file parameter before passing it to the download_file() function, allowing administrators to download arbitrary files on the web server, such as /etc/passwd
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:themeeditor:theme_editor:*:*:*:*:*:wordpress:*:*

History

19 Apr 2021, 16:55

Type Values Removed Values Added
References (CONFIRM) https://wpscan.com/vulnerability/566c6836-fc3d-4dd9-b351-c3d9da9ec22e - (CONFIRM) https://wpscan.com/vulnerability/566c6836-fc3d-4dd9-b351-c3d9da9ec22e - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 4.9
CWE CWE-552
CPE cpe:2.3:a:themeeditor:theme_editor:*:*:*:*:*:wordpress:*:*

05 Apr 2021, 19:29

Type Values Removed Values Added
New CVE

Information

Published : 2021-04-05 19:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-24154

Mitre link : CVE-2021-24154

CVE.ORG link : CVE-2021-24154


JSON object : View

Products Affected

themeeditor

  • theme_editor
CWE
CWE-552

Files or Directories Accessible to External Parties