Medium CVSS 4.9

Overview

The RSFirewall! plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.1.42 via the get_local_filename() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

Risk analysis

This vulnerability is rated 🟡 MEDIUM.

  • CVSS: 4.9 (MEDIUM)
  • Detected tags: path, wordpress (tag impact: MODERATE)

Recommended actions:

  • Canonicalize path; block `..` traversal; use allowlists.

Recommended tools

Tags