First published: Tue May 30 2023(Updated: )
The Image Optimizer by 10web WordPress plugin before 1.0.27 does not sanitize the dir parameter when handling the get_subdirs ajax action, allowing a high privileged users such as admins to inspect names of files and directories outside of the sites root.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
10web Image Optimizer | <1.0.27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID of this vulnerability is CVE-2023-2117.
The title of this vulnerability is 'The Image Optimizer by 10web WordPress plugin before 1.0.27 does not sanitize the dir parameter when…'.
This vulnerability affects the Image Optimizer by 10web WordPress plugin version 1.0.26 or below.
The severity of this vulnerability is low, with a severity value of 2.7.
The vulnerability can be exploited by high privileged users, such as admins, to inspect names of files and directories outside of the site's root.