Vulnerability Description
The LifterLMS – WordPress LMS Plugin for eLearning plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 7.4.2 via the maybe_serve_export function. This makes it possible for authenticated attackers, with administrator or LMS manager access and above, to read the contents of arbitrary CSV files on the server, which can contain sensitive information as well as removing those files from the server.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lifterlms | Lifterlms | <= 7.4.2 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/2989461/Third Party Advisory
- https://www.wordfence.com/threat-intel/vulnerabilities/id/6d0fcd82-6d4a-454f-805Third Party Advisory
- https://plugins.trac.wordpress.org/changeset/2989461/Third Party Advisory
- https://www.wordfence.com/threat-intel/vulnerabilities/id/6d0fcd82-6d4a-454f-805Third Party Advisory
FAQ
What is CVE-2023-6160?
CVE-2023-6160 is a vulnerability with a CVSS score of 3.3 (LOW). The LifterLMS – WordPress LMS Plugin for eLearning plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 7.4.2 via the maybe_serve_export function. This makes it ...
How severe is CVE-2023-6160?
CVE-2023-6160 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-6160?
Check the references section above for vendor advisories and patch information. Affected products include: Lifterlms Lifterlms.