CVE-2024-7135
Tainacan <= 0.21.7 - Missing Authorization to Authenticated (Subscriber+) Arbitrary File Read
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
The Tainacan plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_file' function in all versions up to, and including, 0.21.7. The function is also vulnerable to directory traversal. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
El complemento Tainacan para WordPress es vulnerable al acceso no autorizado a los datos debido a una verificación de capacidad faltante en la función 'get_file' en todas las versiones hasta la 0.21.7 incluida. La función también es vulnerable a directory traversal. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, lean el contenido de archivos arbitrarios en el servidor, que pueden contener información confidencial.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-07-26 CVE Reserved
- 2024-07-30 CVE Published
- 2024-08-01 CVE Updated
- 2024-10-11 First Exploit
- 2024-10-12 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-862: Missing Authorization
CAPEC
References (6)
URL | Date | SRC |
---|---|---|
https://github.com/RandomRobbieBF/CVE-2024-7135 | 2024-10-11 | |
https://github.com/Nxploited/CVE-2024-7135 | 2025-01-01 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Leogermani Search vendor "Leogermani" | Tainacan Search vendor "Leogermani" for product "Tainacan" | <= 0.21.7 Search vendor "Leogermani" for product "Tainacan" and version " <= 0.21.7" | en |
Affected
|