CVE-2015-7683
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
16/10/2015
Last modified:
06/05/2026
Description
Absolute path traversal vulnerability in Font.php in the Font plugin before 7.5.1 for WordPress allows remote administrators to read arbitrary files via a full pathname in the url parameter to AjaxProxy.php.
Impact
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:font_project:font:*:*:*:*:*:wordpress:*:* | 7.5 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/133930/WordPress-Font-7.5-Path-Traversal.html
- http://www.securityfocus.com/archive/1/536670/100/0/threaded
- https://wordpress.org/plugins/font/changelog/
- https://wpvulndb.com/vulnerabilities/8214
- http://packetstormsecurity.com/files/133930/WordPress-Font-7.5-Path-Traversal.html
- http://www.securityfocus.com/archive/1/536670/100/0/threaded
- https://wordpress.org/plugins/font/changelog/
- https://wpvulndb.com/vulnerabilities/8214



