Vulnerability Description
Absolute path traversal vulnerability in Font.php in the Font plugin before 7.5.1 for WordPress allows remote administrators to read arbitrary files via a full pathname in the url parameter to AjaxProxy.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Font Project | Font | <= 7.5 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/133930/WordPress-Font-7.5-Path-Traversal.htExploit
- http://www.securityfocus.com/archive/1/536670/100/0/threaded
- https://wordpress.org/plugins/font/changelog/Patch
- https://wpvulndb.com/vulnerabilities/8214
- http://packetstormsecurity.com/files/133930/WordPress-Font-7.5-Path-Traversal.htExploit
- http://www.securityfocus.com/archive/1/536670/100/0/threaded
- https://wordpress.org/plugins/font/changelog/Patch
- https://wpvulndb.com/vulnerabilities/8214
FAQ
What is CVE-2015-7683?
CVE-2015-7683 is a vulnerability with a CVSS score of 4.0 (MEDIUM). Absolute path traversal vulnerability in Font.php in the Font plugin before 7.5.1 for WordPress allows remote administrators to read arbitrary files via a full pathname in the url parameter to AjaxPro...
How severe is CVE-2015-7683?
CVE-2015-7683 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-7683?
Check the references section above for vendor advisories and patch information. Affected products include: Font Project Font.