The RVM WordPress plugin before 6.4.2 does not have proper authorisation, CSRF checks and validation of the rvm_upload_regions_file_path parameter in the rvm_import_regions AJAX action, allowing any authenticated user, such as subscriber, to read arbitrary files on the web server
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/c6bb12b1-6961-40bd-9110-edfa9ee41a18 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/c6bb12b1-6961-40bd-9110-edfa9ee41a18 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/c6bb12b1-6961-40bd-9110-edfa9ee41a18 - Exploit, Third Party Advisory |
Information
Published : 2022-02-07 16:15
Updated : 2024-11-21 05:54
NVD link : CVE-2021-24947
Mitre link : CVE-2021-24947
CVE.ORG link : CVE-2021-24947
JSON object : View
Products Affected
thinkupthemes
- responsive_vector_maps