The PeepSo Core: File Uploads plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.4.6.0 via the file_download REST API endpoint due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to download files uploaded by others users and expose potentially sensitive information.
Metrics
Affected Vendors & Products
References
History
Wed, 14 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 May 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The PeepSo Core: File Uploads plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.4.6.0 via the file_download REST API endpoint due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to download files uploaded by others users and expose potentially sensitive information. | |
| Title | PeepSo Core: File Uploads <= 6.4.6.0 - Insecure Direct Object Reference to Unauthenticated Sensitive Information Exposure via file_download | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-05-14T08:22:09.058Z
Updated: 2025-05-14T13:17:42.359Z
Reserved: 2024-09-18T21:52:48.146Z
Link: CVE-2024-8988
Updated: 2025-05-14T13:17:38.528Z
Status : Awaiting Analysis
Published: 2025-05-14T09:15:19.803
Modified: 2025-05-16T14:43:56.797
Link: CVE-2024-8988
No data.