CVE-2024-8538

Source
https://cve.org/CVERecord?id=CVE-2024-8538
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-8538.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-8538
Published
2024-09-07T09:15:03.773Z
Modified
2025-11-16T12:05:03.765213Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

The Big File Uploads – Increase Maximum File Upload Size plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 2.1.2. This is due the plugin not sanitizing a file path in an error message. This makes it possible for authenticated attackers, with author-level access and above, to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.

References

Affected packages

Git / github.com/uglyrobot/big-file-uploads

Affected ranges

Type
GIT
Repo
https://github.com/uglyrobot/big-file-uploads
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

2.*
2.0
2.0.1
2.0.2
2.0.3
2.1
2.1.1
2.1.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-8538.json"