The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
Metrics
Affected Vendors & Products
References
History
Mon, 21 Jul 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 19 Jul 2025 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. | |
Title | GI-Media Library < 3.0 - Directory Traversal | |
Weaknesses | CWE-22 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-07-19T09:23:51.606Z
Updated: 2025-07-21T16:53:44.202Z
Reserved: 2025-07-18T21:19:57.981Z
Link: CVE-2015-10136

Updated: 2025-07-21T16:53:36.564Z

Status : Awaiting Analysis
Published: 2025-07-19T10:15:23.773
Modified: 2025-07-22T13:06:07.260
Link: CVE-2015-10136

No data.