WordPress MP3 jPlayer Plugin <= 2.3 is vulnerable to Local File Inclusion

Patch priority: low
Resolve by 22 April, 2015 Low priority
Unknown severity CVSS 3.1 score

Prevent exploits against this and future vulnerabilities!

Protect now

Solution

Fixed Update to fix

Update the plugin.

KedAns-Dz discovered and reported this Local File Inclusion vulnerability in WordPress MP3 jPlayer Plugin. This could allow a malicious actor to include local files of the target website and show its output onto the screen. Files which store credentials, such as database credentials, could potentially allow complete database takeover depending on the configuration. This vulnerability has been fixed in version 2.4.

Have additional information or questions about this entry? Get in touch.

Other vulnerabilities in this plugin

1 present
9 fixed
View all
Mobile Menu

Let us know if we have missed a vulnerability reported elsewhere

Mobile Menu Close

Thank you for contributing!

Close Mobile Menu