The System Dashboard WordPress plugin before 2.8.15 does not validate user input used in a path, which could allow high privilege users such as admin to perform path traversal attacks an read arbitrary files on the server
                
            References
                    | Link | Resource | 
|---|---|
| https://wpscan.com/vulnerability/61d750a5-8c2c-4c94-a1a9-6a254c2a0d03/ | Exploit Third Party Advisory | 
Configurations
                    History
                    17 May 2025, 02:00
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://wpscan.com/vulnerability/61d750a5-8c2c-4c94-a1a9-6a254c2a0d03/ - Exploit, Third Party Advisory | |
| CWE | CWE-22 | |
| Summary | 
 | |
| First Time | Bowo system Dashboard Bowo | |
| CPE | cpe:2.3:a:bowo:system_dashboard:*:*:*:*:*:wordpress:*:* | 
10 Dec 2024, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 4.9 | 
10 Dec 2024, 06:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-12-10 06:15
Updated : 2025-05-17 02:00
NVD link : CVE-2024-10708
Mitre link : CVE-2024-10708
CVE.ORG link : CVE-2024-10708
JSON object : View
Products Affected
                bowo
- system_dashboard
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
