Security programs Bounty leaderboard API Protect

WordPress OMGF | Host Google Fonts Locally Plugin <= 4.5.11 is vulnerable to Directory Traversal

Patch within 30 days Low priority
Not known to be exploited Report an attack
6.5
Medium severity CVSS 3.1 score

Detect and mitigate security vulnerabilities at scale with Patchstack!

Enable Protection

Solution

Update to fix

Update the WordPress OMGF | Host Google Fonts Locally plugin to the latest available version (at least 4.5.12).

jsgm discovered and reported this Directory Traversal vulnerability in WordPress OMGF | Host Google Fonts Locally Plugin. This could allow a malicious actor to see all files in a given directory or determine if certain files/directories exist in given folder. This can be used to exploit other weaknesses in the system This vulnerability has been fixed in version 4.5.12.

No other known vulnerabilities for this plugin

Report

WordPress plugin developer?

Start a free security program for your WordPress plugins or request an audit.

Apply for MVDP

Security researcher?

Report to Patchstack Alliance bounty platform and earn monthly cash prizes.

Learn more

Let us know if we have missed a vulnerability reported elsewhere

Report arrow right Close

Thank you for contributing!

Successfully submit vulnerabilities and receive an invite to our Alliance platform.

Learn more arrow right Close