### [CVE-2024-13617](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13617) ![](https://img.shields.io/static/v1?label=Product&message=aoa-downloadable&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties&color=brighgreen) ### Description The aoa-downloadable WordPress plugin through 0.1.0 doesn't validate a parameter in its download function, allowing unauthenticated attackers to download arbitrary files from the server ### POC #### Reference - https://wpscan.com/vulnerability/8d6dd979-21ef-4d14-9c42-bbd1d7b65c53/ #### Github No PoCs found on GitHub currently.