The Theme Editor WordPress plugin before 2.6 did not validate the GET file parameter before passing it to the download_file() function, allowing administrators to download arbitrary files on the web server, such as /etc/passwd
The product makes files or directories accessible to unauthorized actors, even though they should not be.
Link | Tags |
---|---|
https://wpscan.com/vulnerability/566c6836-fc3d-4dd9-b351-c3d9da9ec22e | third party advisory |