First published: Thu Jan 05 2017(Updated: )
Directory traversal vulnerability in the File_Upload_Upgrader class in wp-admin/includes/class-file-upload-upgrader.php in the upgrade package uploader in WordPress before 4.6.1 allows remote authenticated users to access arbitrary files via a crafted urlholder parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7169 is considered a medium severity vulnerability that allows unauthorized file access.
To fix CVE-2016-7169, upgrade WordPress to version 4.6.1 or later.
CVE-2016-7169 affects WordPress versions prior to 4.6.1, specifically remote authenticated users.
CVE-2016-7169 is a directory traversal vulnerability that enables access to arbitrary files.
Yes, CVE-2016-7169 can be exploited remotely by authenticated users through a specially crafted request.