{"id":"BIT-wordpress-multisite-2024-32111","summary":"WordPress core \u003c 6.5.5 - Auth. Arbitrary .html File Read (Windows Only) vulnerability","details":"Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Automattic WordPress allows Relative Path Traversal.This issue affects WordPress: from 6.5 through 6.5.4, from 6.4 through 6.4.4, from 6.3 through 6.3.4, from 6.2 through 6.2.5, from 6.1 through 6.1.6, from 6.0 through 6.0.8, from 5.9 through 5.9.9, from 5.8 through 5.8.9, from 5.7 through 5.7.11, from 5.6 through 5.6.13, from 5.5 through 5.5.14, from 5.4 through 5.4.15, from 5.3 through 5.3.17, from 5.2 through 5.2.20, from 5.1 through 5.1.18, from 5.0 through 5.0.21, from 4.9 through 4.9.25, from 4.8 through 4.8.24, from 4.7 through 4.7.28, from 4.6 through 4.6.28, from 4.5 through 4.5.31, from 4.4 through 4.4.32, from 4.3 through 4.3.33, from 4.2 through 4.2.37, from 4.1 through 4.1.40.","aliases":["BIT-wordpress-2024-32111","CVE-2024-32111"],"modified":"2025-05-20T10:02:07.006Z","published":"2024-06-27T07:41:57.553Z","database_specific":{"severity":"Medium","cpes":["cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://patchstack.com/database/vulnerability/wordpress/wordpress-core-6-5-5-contributor-arbitrary-html-file-read-windows-only-vulnerability?_s_id=cve"},{"type":"WEB","url":"https://wordpress.org/news/2024/06/wordpress-6-5-5/"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-32111"}],"affected":[{"package":{"name":"wordpress-multisite","ecosystem":"Bitnami","purl":"pkg:bitnami/wordpress-multisite"},"ranges":[{"type":"SEMVER","events":[{"introduced":"4.1.0"},{"fixed":"4.1.41"},{"introduced":"4.2.0"},{"fixed":"4.2.38"},{"introduced":"4.3.0"},{"fixed":"4.3.34"},{"introduced":"4.4.0"},{"fixed":"4.4.33"},{"introduced":"4.5.0"},{"fixed":"4.5.32"},{"introduced":"4.6.0"},{"fixed":"4.6.29"},{"introduced":"4.7.0"},{"fixed":"4.7.29"},{"introduced":"4.8.0"},{"fixed":"4.8.25"},{"introduced":"4.9.0"},{"fixed":"4.9.26"},{"introduced":"5.0.0"},{"fixed":"5.0.22"},{"introduced":"5.1.0"},{"fixed":"5.1.19"},{"introduced":"5.2.0"},{"fixed":"5.2.21"},{"introduced":"5.3.0"},{"fixed":"5.3.18"},{"introduced":"5.4.0"},{"fixed":"5.4.16"},{"introduced":"5.5.0"},{"fixed":"5.5.15"},{"introduced":"5.6.0"},{"fixed":"5.6.14"},{"introduced":"5.7.0"},{"fixed":"5.7.12"},{"introduced":"5.8.0"},{"fixed":"5.8.10"},{"introduced":"5.9.0"},{"fixed":"5.9.10"},{"introduced":"6.0.0"},{"fixed":"6.0.9"},{"introduced":"6.1.0"},{"fixed":"6.1.7"},{"introduced":"6.2.0"},{"fixed":"6.2.6"},{"introduced":"6.3.0"},{"fixed":"6.3.5"},{"introduced":"6.4.0"},{"fixed":"6.4.5"},{"introduced":"6.5.0"},{"fixed":"6.5.5"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/wordpress-multisite/BIT-wordpress-multisite-2024-32111.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}]}],"schema_version":"1.7.3"}