The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
History

Tue, 16 Dec 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Zishanj
Zishanj gi-media-library
CPEs cpe:2.3:a:zishanj:gi-media-library:*:*:*:*:*:wordpress:*:*
Vendors & Products Zishanj
Zishanj gi-media-library

Mon, 21 Jul 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 19 Jul 2025 09:45:00 +0000

Type Values Removed Values Added
Description The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
Title GI-Media Library < 3.0 - Directory Traversal
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-07-19T09:23:51.606Z

Updated: 2025-07-21T16:53:44.202Z

Reserved: 2025-07-18T21:19:57.981Z

Link: CVE-2015-10136

cve-icon Vulnrichment

Updated: 2025-07-21T16:53:36.564Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-19T10:15:23.773

Modified: 2025-12-16T16:40:40.800

Link: CVE-2015-10136

cve-icon Redhat

No data.