CVE-2024-10585

The InfiniteWP Client plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.13.0 via the 'historyID' parameter of the ~/debug-chart/index.php file. This makes it possible for unauthenticated attackers to read .txt files outside of the intended directory.
Configurations

Configuration 1 (hide)

cpe:2.3:a:revmakx:infinitewp_client:*:*:*:*:*:wordpress:*:*

History

26 Feb 2025, 18:25

Type Values Removed Values Added
Summary
  • (es) El complemento InfiniteWP Client para WordPress es vulnerable a Path Traversal en todas las versiones hasta la 1.13.0 incluida a través del parámetro 'historyID' del archivo ~/debug-chart/index.php. Esto permite que atacantes no autenticados lean archivos .txt fuera del directorio previsto.
CPE cpe:2.3:a:revmakx:infinitewp_client:*:*:*:*:*:wordpress:*:*
First Time Revmakx
Revmakx infinitewp Client
References () https://plugins.svn.wordpress.org/iwp-client/tags/1.13.0/debug-chart/index.php - () https://plugins.svn.wordpress.org/iwp-client/tags/1.13.0/debug-chart/index.php - Product
References () https://plugins.trac.wordpress.org/changeset/3202851/iwp-client/trunk/debug-chart/index.php - () https://plugins.trac.wordpress.org/changeset/3202851/iwp-client/trunk/debug-chart/index.php - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/4d2518f6-3647-4bee-a98c-ce7f30375a62?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/4d2518f6-3647-4bee-a98c-ce7f30375a62?source=cve - Third Party Advisory

08 Jan 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-08 06:15

Updated : 2025-02-26 18:25


NVD link : CVE-2024-10585

Mitre link : CVE-2024-10585

CVE.ORG link : CVE-2024-10585


JSON object : View

Products Affected

revmakx

  • infinitewp_client
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')