The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
History

Mon, 21 Jul 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 19 Jul 2025 09:45:00 +0000

Type Values Removed Values Added
Description The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
Title GI-Media Library < 3.0 - Directory Traversal
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-07-19T09:23:51.606Z

Updated: 2025-07-21T16:53:44.202Z

Reserved: 2025-07-18T21:19:57.981Z

Link: CVE-2015-10136

cve-icon Vulnrichment

Updated: 2025-07-21T16:53:36.564Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-19T10:15:23.773

Modified: 2025-07-22T13:06:07.260

Link: CVE-2015-10136

cve-icon Redhat

No data.