This vulnerability is highly dangerous and expected to become exploited. Vulnerabilities like this one are used in mass-exploit campaigns. Attackers use these to attack thousands of websites at a time, regardless of traffic size or popularity. Learn more.
As immediate action, update the affected plugin. If you're unable to do so, ask your hosting provider or web developer for help.
This could allow a malicious actor to download any file from your website. This includes but is not limited to files that contain login credentials or backup files.
CVSS score is a way to evaluate and rank reported vulnerabilities in a standardized and repeatable way but which is not ideal for WordPress.
We advise to mitigate or resolve the vulnerability immediately.
Patchstack has issued a mitigation rule to block any attacks until an official patch becomes available, can be tested and be safely applied.
24 Jan, 2025
Early warning sent out to Patchstack customers
2 Feb, 2025
Published by Patchstack
2 Feb, 2025