Vulnerability Description
Absolute path traversal vulnerability in lib/download.php in the IBS Mappro plugin before 1.0 for WordPress allows remote attackers to read arbitrary files via a full pathname in the file parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ibs Mappro Project | Ibs Mappro | <= 0.6 |
Related Weaknesses (CWE)
References
- http://www.vapid.dhs.org/advisory.php?v=137Exploit
- https://wordpress.org/plugins/ibs-mappro/changelog/Vendor Advisory
- https://wpvulndb.com/vulnerabilities/8091Exploit
- http://www.vapid.dhs.org/advisory.php?v=137Exploit
- https://wordpress.org/plugins/ibs-mappro/changelog/Vendor Advisory
- https://wpvulndb.com/vulnerabilities/8091Exploit
FAQ
What is CVE-2015-5472?
CVE-2015-5472 is a vulnerability with a CVSS score of 7.8 (HIGH). Absolute path traversal vulnerability in lib/download.php in the IBS Mappro plugin before 1.0 for WordPress allows remote attackers to read arbitrary files via a full pathname in the file parameter.
How severe is CVE-2015-5472?
CVE-2015-5472 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5472?
Check the references section above for vendor advisories and patch information. Affected products include: Ibs Mappro Project Ibs Mappro.