Summary
The Filedownload plug-in for WordPress is prone to a local file- disclosure vulnerability because it fails to adequately validate user- supplied input.
Exploiting this vulnerability could allow an attacker to obtain potentially sensitive information from local files on computers running the vulnerable application. This may aid in further attacks.
Filedownload 0.1 is vulnerable
other versions may also be affected.
References
Severity
Classification
-
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Apache ActiveMQ 'admin/queueBrowse' Cross Site Scripting Vulnerability
- 7Media Web Solutions EduTrac Directory Traversal Vulnerability
- An Image Gallery Multiple Cross-Site Scripting Vulnerability
- Apache OFBiz Multiple Cross Site Scripting Vulnerabilities
- Afian 'includer.php' Directory Traversal Vulnerability