First published: Fri Nov 28 2014(Updated: )
Directory traversal vulnerability in services/getfile.php in the Paid Memberships Pro plugin before 1.7.15 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the QUERY_STRING in a getfile action to wp-admin/admin-ajax.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Paid Memberships Pro | <1.7.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8801 has a medium severity rating due to its potential for unauthorized file access.
To fix CVE-2014-8801, upgrade the Paid Memberships Pro plugin to version 1.7.15 or later.
CVE-2014-8801 affects the Paid Memberships Pro plugin versions prior to 1.7.15 on WordPress installations.
CVE-2014-8801 allows remote attackers to read arbitrary files on the server due to the directory traversal vulnerability.
While CVE-2014-8801 primarily enables file reading, it could potentially be leveraged for further attacks if sensitive files are accessed.