CVE-2021-24549

The AceIDE WordPress plugin through 2.6.2 does not sanitise or validate the user input which is appended to system paths before using it in various actions, such as to read arbitrary files from the server. This allows high privilege users such as administrator to access any file on the web server outside of the blog directory via a path traversal attack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:aceide_project:aceide:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:53

Type Values Removed Values Added
References () https://codevigilant.com/disclosure/2021/wp-plugin-aceide/ - Exploit, Third Party Advisory () https://codevigilant.com/disclosure/2021/wp-plugin-aceide/ - Exploit, Third Party Advisory
References () https://wpscan.com/vulnerability/c594abaf-b152-448c-8a20-9b3267fe547a - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/c594abaf-b152-448c-8a20-9b3267fe547a - Exploit, Third Party Advisory

Information

Published : 2021-08-23 12:15

Updated : 2024-11-21 05:53


NVD link : CVE-2021-24549

Mitre link : CVE-2021-24549

CVE.ORG link : CVE-2021-24549


JSON object : View

Products Affected

aceide_project

  • aceide
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')