Lucene search

K
cve[email protected]CVE-2024-5599
HistoryJun 07, 2024 - 1:15 p.m.

CVE-2024-5599

2024-06-0713:15:50
web.nvd.nist.gov
23
fileorganizer plugin
wordpress
sensitive information exposure
unauthenticated attackers
trash folder.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.2%

The FileOrganizer – Manage WordPress and Website Files plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.7 via the ‘fileorganizer_ajax_handler’ function. This makes it possible for unauthenticated attackers to extract sensitive data including backups or other sensitive information if the files have been moved to the built-in Trash folder.

Affected configurations

Vulners
NVD
Node
softaculoussoftaculousRange1.0.7

CNA Affected

[
  {
    "vendor": "softaculous",
    "product": "FileOrganizer – Manage WordPress and Website Files",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.0.7",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.2%