cve/2024/CVE-2024-13617.md
2025-09-29 16:08:36 +00:00

18 lines
757 B
Markdown

### [CVE-2024-13617](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13617)
![](https://img.shields.io/static/v1?label=Product&message=aoa-downloadable&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties&color=brighgreen)
### Description
The aoa-downloadable WordPress plugin through 0.1.0 doesn't validate a parameter in its download function, allowing unauthenticated attackers to download arbitrary files from the server
### POC
#### Reference
- https://wpscan.com/vulnerability/8d6dd979-21ef-4d14-9c42-bbd1d7b65c53/
#### Github
No PoCs found on GitHub currently.