CVE-2024-56248

WPMasterToolKit <= 1.13.1 - Authenticated (Admin+) Arbitrary File Download

mediumImproper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
4.9
CVSS Score
4.9
CVSS Score
medium
Severity
1.14.0
Patched in
10d
Time to patch

Description

The WPMasterToolKit (WPMTK) – All in one plugin plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.13.1. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
High
Confidentiality
None
Integrity
None
Availability

Technical Details

Affected versions<=1.13.1
PublishedDecember 30, 2024
Last updatedJanuary 8, 2025
Affected pluginwpmastertoolkit

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.