CVE-2015-10105
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to remotely access sensitive files on a server by manipulating a specific filename in the IP Blacklist Cloud Plugin for WordPress. To exploit this, the attacker needs to send a specially crafted request to the affected plugin, which could lead to unauthorized access to the server's file system.
Technical Description
A vulnerability, which was classified as critical, was found in IP Blacklist Cloud Plugin up to 3.42 on WordPress. This affects the function valid_js_identifier of the file ip_blacklist_cloud.php of the component CSV File Import. The manipulation of the argument filename leads to path traversal. It is possible to initiate the attack remotely. Upgrading to version 3.43 is able to address this issue. The identifier of the patch is 6e6fe8c6fda7cbc252eef083105e08d759c07312. It is recommended to upgrade the affected component. The identifier VDB-227757 was assigned to this vulnerability.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
May 1, 2023
almost 3 years ago
Last Modified
Feb 27, 2026
about 1 month ago
Vendor
ad33lx
Product
ip blacklist cloud
Related Vulnerabilities
This vulnerability allows an attacker to manipulate the database of the IP Blacklist Cloud plugin, potentially gaining access to sensitive information or altering data. It affects versions up to 5.00 and requires the attacker to be authenticated, meaning they need to log in to exploit it.
This vulnerability allows an attacker to inject malicious scripts into the IP Blacklist Cloud plugin, which can then be executed in the browsers of users who have access to the plugin. To exploit this, the attacker must have authenticated access to the plugin, meaning they need to log in as a legitimate user.