🔐 CVE Alert

CVE-2024-32111

MEDIUM 5.0

WordPress core < 6.5.5 - Auth. Arbitrary .html File Read (Windows Only) vulnerability

CVSS Score
5.0
EPSS Score
0.0%
EPSS Percentile
0th

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Automattic WordPress allows Relative Path Traversal.This issue affects WordPress: from 6.5 through 6.5.4, from 6.4 through 6.4.4, from 6.3 through 6.3.4, from 6.2 through 6.2.5, from 6.1 through 6.1.6, from 6.0 through 6.0.8, from 5.9 through 5.9.9, from 5.8 through 5.8.9, from 5.7 through 5.7.11, from 5.6 through 5.6.13, from 5.5 through 5.5.14, from 5.4 through 5.4.15, from 5.3 through 5.3.17, from 5.2 through 5.2.20, from 5.1 through 5.1.18, from 5.0 through 5.0.21, from 4.9 through 4.9.25, from 4.8 through 4.8.24, from 4.7 through 4.7.28, from 4.6 through 4.6.28, from 4.5 through 4.5.31, from 4.4 through 4.4.32, from 4.3 through 4.3.33, from 4.2 through 4.2.37, from 4.1 through 4.1.40.

CWE CWE-22
Vendor automattic
Product wordpress
Ecosystems
Industries
WebMedia
Published Jun 25, 2024
Last Updated Apr 28, 2026
Stay Ahead of the Next One

Get instant alerts for automattic wordpress

Be the first to know when new medium vulnerabilities affecting automattic wordpress are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Affected Versions

Automattic / WordPress
6.5 ≤ 6.5.4 6.4 ≤ 6.4.4 6.3 ≤ 6.3.4 6.2 ≤ 6.2.5 6.1 ≤ 6.1.6 6.0 ≤ 6.0.8 5.9 ≤ 5.9.9 5.8 ≤ 5.8.9 5.7 ≤ 5.7.11 5.6 ≤ 5.6.13 5.5 ≤ 5.5.14 5.4 ≤ 5.4.15 5.3 ≤ 5.3.17 5.2 ≤ 5.2.20 5.1 ≤ 5.1.18 5.0 ≤ 5.0.21 4.9 ≤ 4.9.25 4.8 ≤ 4.8.24 4.7 ≤ 4.7.28 4.6 ≤ 4.6.28 4.5 ≤ 4.5.31 4.4 ≤ 4.4.32 4.3 ≤ 4.3.33 4.2 ≤ 4.2.37 4.1 ≤ 4.1.40

References

NVD ↗ CVE.org ↗ EPSS Data ↗
patchstack.com: https://patchstack.com/database/vulnerability/wordpress/wordpress-core-6-5-5-contributor-arbitrary-html-file-read-windows-only-vulnerability?_s_id=cve wordpress.org: https://wordpress.org/news/2024/06/wordpress-6-5-5/

Credits

Rafie Muhammad (Patchstack) Edouard L. (Patchstack) David Fifield x89 apple502j mishre