The InfiniteWP Client plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.13.0 via the 'historyID' parameter of the ~/debug-chart/index.php file. This makes it possible for unauthenticated attackers to read .txt files outside of the intended directory.
References
Configurations
History
26 Feb 2025, 18:25
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:revmakx:infinitewp_client:*:*:*:*:*:wordpress:*:* | |
First Time |
Revmakx
Revmakx infinitewp Client |
|
References | () https://plugins.svn.wordpress.org/iwp-client/tags/1.13.0/debug-chart/index.php - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3202851/iwp-client/trunk/debug-chart/index.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/4d2518f6-3647-4bee-a98c-ce7f30375a62?source=cve - Third Party Advisory |
08 Jan 2025, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-08 06:15
Updated : 2025-02-26 18:25
NVD link : CVE-2024-10585
Mitre link : CVE-2024-10585
CVE.ORG link : CVE-2024-10585
JSON object : View
Products Affected
revmakx
- infinitewp_client
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')