CVE-2024-6306

Rejected reason: **REJECT** Accidental Reservation making this a duplicate. Please use CVE-2024-32111.
CVSS

No CVSS.

References

No reference.

Configurations

No configuration.

History

25 Jun 2024, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 4.3
v2 : unknown
v3 : unknown
References
  • {'url': 'https://core.trac.wordpress.org/changeset/58470', 'source': 'security@wordfence.com'}
  • {'url': 'https://wordpress.org/news/2024/06/wordpress-6-5-5/', 'source': 'security@wordfence.com'}
  • {'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/4af2b01b-2dcb-44ae-a764-8ecc5f8caa81?source=cve', 'source': 'security@wordfence.com'}
Summary (en) WordPress Core is vulnerable to Directory Traversal in various versions up to 6.5.5 via the Template Part block. This makes it possible for authenticated attackers, with Contributor-level access and above, to include arbitrary HTML Files on sites running Windows. (en) Rejected reason: **REJECT** Accidental Reservation making this a duplicate. Please use CVE-2024-32111.

25 Jun 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-25 11:15

Updated : 2024-06-25 17:15


NVD link : CVE-2024-6306

Mitre link : CVE-2024-6306

CVE.ORG link : CVE-2024-6306


JSON object : View

Products Affected

No product.

CWE

No CWE.