{"id":"CVE-2016-7169","details":"Directory traversal vulnerability in the File_Upload_Upgrader class in wp-admin/includes/class-file-upload-upgrader.php in the upgrade package uploader in WordPress before 4.6.1 allows remote authenticated users to access arbitrary files via a crafted urlholder parameter.","modified":"2026-02-24T11:13:19.538926Z","published":"2017-01-05T02:59:03.887Z","references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/92841"},{"type":"WEB","url":"https://wpvulndb.com/vulnerabilities/8616"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3681"},{"type":"ADVISORY","url":"https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/"},{"type":"FIX","url":"https://codex.wordpress.org/Version_4.6.1"},{"type":"FIX","url":"https://github.com/WordPress/WordPress/commit/54720a14d85bc1197ded7cb09bd3ea790caa0b6e"},{"type":"FIX","url":"https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wordpress/wordpress","events":[{"introduced":"0"},{"fixed":"54720a14d85bc1197ded7cb09bd3ea790caa0b6e"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-7169.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}]}