The Best WordPress Gallery Plugin – FooGallery plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.4.26. This makes it possible for authenticated attackers, with contributor level or higher to read the contents of arbitrary folders on the server, which can contain sensitive information such as folder structure.
References
Configurations
History
24 Feb 2025, 18:22
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fooplugins
Fooplugins foogallery |
|
CPE | cpe:2.3:a:fooplugins:foogallery:*:*:*:*:premium:wordpress:*:* | |
Summary |
|
|
CWE | CWE-22 | |
References | () https://github.com/fooplugins/foogallery/pull/263/commits/9989f6f4f4d478ec04cb634d09b18c87a5b31c4d - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/68420c5a-4add-4597-bd2a-20dc831e81bd?source=cve - Third Party Advisory |
10 Dec 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-10 06:15
Updated : 2025-02-24 18:22
NVD link : CVE-2023-6947
Mitre link : CVE-2023-6947
CVE.ORG link : CVE-2023-6947
JSON object : View
Products Affected
fooplugins
- foogallery