The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
Metrics
Affected Vendors & Products
References
History
Tue, 16 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zishanj
Zishanj gi-media-library |
|
| CPEs | cpe:2.3:a:zishanj:gi-media-library:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Zishanj
Zishanj gi-media-library |
Mon, 21 Jul 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 19 Jul 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. | |
| Title | GI-Media Library < 3.0 - Directory Traversal | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-07-19T09:23:51.606Z
Updated: 2025-07-21T16:53:44.202Z
Reserved: 2025-07-18T21:19:57.981Z
Link: CVE-2015-10136
Updated: 2025-07-21T16:53:36.564Z
Status : Analyzed
Published: 2025-07-19T10:15:23.773
Modified: 2025-12-16T16:40:40.800
Link: CVE-2015-10136
No data.