First published: Thu Nov 14 2024(Updated: )
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in realmag777 WOLF allows Path Traversal.This issue affects WOLF: from n/a through 1.0.8.3.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
realmag777 WOLF – WordPress Posts Bulk Editor and Manager Professional | <1.0.8.4 | |
realma777 WOLF | <=1.0.8.3 | |
WordPress WOLF plugin | <=1.0.8.3 |
Update to 1.0.8.4 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52396 is classified as a Path Traversal vulnerability, which can allow unauthorized access to sensitive files.
To fix CVE-2024-52396, update the WOLF software to a version later than 1.0.8.3 or apply security patches provided by the vendor.
CVE-2024-52396 affects realmag777 WOLF and the WordPress WOLF plugin up to version 1.0.8.3.
The potential impacts of CVE-2024-52396 include unauthorized file access and possible exploitation of sensitive information.
Yes, CVE-2024-52396 has known exploit opportunities due to improper limitation of pathname access.