First published: Fri Oct 25 2024(Updated: )
The BuddyPress plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 14.1.0 via the id parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory and enables file uploads to directories outside of the web root. Depending on server configuration it may be possible to upload files with double extensions. This vulnerability only affects Windows.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
BuddyPress | <=14.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10011 is considered a high severity vulnerability due to its potential for unauthorized file access.
To fix CVE-2024-10011, update the BuddyPress plugin to version 14.1.1 or higher.
CVE-2024-10011 affects all versions of the BuddyPress plugin for WordPress up to and including 14.1.0.
CVE-2024-10011 is a Directory Traversal vulnerability that allows for accessing files outside the intended directory.
Authenticated attackers with Subscriber-level access and above can perform unauthorized actions on files due to CVE-2024-10011.