WordPress Plugin Vulnerabilities
Bit Assist < 1.5.3 - Subscriber+ Arbitrary File Read via fileID Parameter
Description
The plugin is vulnerable to Path Traversal via the fileID Parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Affects Plugins
References
Miscellaneous
Original Researcher
Arkadiusz Hydzik
Verified
No
WPVDB ID
Timeline
Publicly Published
2025-02-14 (about 1 year ago)
Added
2025-02-20 (about 1 year ago)
Last Updated
2025-02-20 (about 1 year ago)