First published: Fri May 17 2024(Updated: )
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WP Automatic Automatic allows Path Traversal, Server Side Request Forgery.This issue affects Automatic: from n/a through 3.92.0.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
WP Automatic | <=3.92.0 | |
wp_automatic_widget | <=3.92.0 |
Update to 3.92.1 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27954 is classified as a critical vulnerability due to its potential for arbitrary file downloads and server-side request forgery.
To fix CVE-2024-27954, update WP Automatic to version 3.92.1 or later immediately.
CVE-2024-27954 affects all versions of WP Automatic from n/a through 3.92.0.
CVE-2024-27954 is a Path Traversal vulnerability that allows unauthorized access to files on the server.
Yes, if exploited, CVE-2024-27954 can potentially lead to significant data breaches due to its server-side request forgery capabilities.