🔐 CVE Alert

CVE-2023-3813

HIGH 7.5

Jupiter X Core <= 4.6.6 - Unauthenticated Arbitrary File Download

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

The Jupiter X Core plugin for WordPress is vulnerable to arbitrary file downloads in versions up to, and including, 4.6.6. This makes it possible for unauthenticated attackers to download the contents of arbitrary files on the server, which can contain sensitive information. The requires the premium version of the plugin to be activated. NOTE: This vulnerability was partially patched in version 4.6.5 and fully patched in version 4.6.9.

CWE CWE-22
Vendor artbees
Product jupiter x core
Published Jul 21, 2023
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for artbees jupiter x core

Be the first to know when new high vulnerabilities affecting artbees jupiter x core are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

artbees / Jupiter X Core
0 ≤ 4.6.6

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/f767d94b-fe92-4b69-9d81-96de51e12983?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/extensions/raven/includes/utils.php?rev=2777235#L425 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3138013/jupiterx-core/trunk/includes/extensions/raven/includes/utils.php plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3142669/jupiterx-core/trunk/includes/extensions/raven/includes/utils.php plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/jupiterx-core/tags/4.6.9/includes/extensions/raven/includes/utils.php#L451

Credits

István Márton