'; } else{ echo ''; } echo '
|
|||
Release Date:2025/9/15
Rule Name:CVE-2020-11738: Wordpress Duplicator File Read Vulnerability.
Severity:high
CVE ID:
Descripiton:
|
WordPress is a free and open-source content management system (CMS) based on PHP and MySQL. WordPress is installed on a Web server that is either a part of an Internet hosting service or a network host in its own right. Snap Creek Duplicator is a WordPress site migration plugin used in it. There is a path traversal vulnerability in WordPress Snap Creek Duplicator versions before 1.3.28 and Duplicator Pro versions before 3.8.7.1. An attacker can use this vulnerability to access restricted files by sending the ‘file’ file parameter with the ‘../’ sequence to the duplicater_download or duplicater_init. This rule supports to defend the A6: Vulnerable and Outdated Components and A3: Injection of OWASP Top 10 - 2021.
Other reference:None
Solution:
|
Update vendor patches.