The Best WordPress Gallery Plugin – FooGallery plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.4.26. This makes it possible for authenticated attackers, with contributor level or higher to read the contents of arbitrary folders on the server, which can contain sensitive information such as folder structure.
References
Configurations
History
24 Feb 2025, 18:22
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/fooplugins/foogallery/pull/263/commits/9989f6f4f4d478ec04cb634d09b18c87a5b31c4d - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/68420c5a-4add-4597-bd2a-20dc831e81bd?source=cve - Third Party Advisory | |
CWE | CWE-22 | |
First Time |
Fooplugins
Fooplugins foogallery |
|
CPE | cpe:2.3:a:fooplugins:foogallery:*:*:*:*:premium:wordpress:*:* |
10 Dec 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-10 06:15
Updated : 2025-02-24 18:22
NVD link : CVE-2023-6947
Mitre link : CVE-2023-6947
CVE.ORG link : CVE-2023-6947
JSON object : View
Products Affected
fooplugins
- foogallery