WordPress Plugin Anti-Malware Security and Bruteforce Firewall 4.20.59 contains a directory traversal vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating the file parameter. Attackers can send requests to the duplicator_download action via admin-ajax.php with path traversal sequences to access sensitive system files outside the intended directory.
Metrics
Affected Vendors & Products
References
History
Sat, 16 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress Plugin Anti-Malware Security and Bruteforce Firewall 4.20.59 contains a directory traversal vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating the file parameter. Attackers can send requests to the duplicator_download action via admin-ajax.php with path traversal sequences to access sensitive system files outside the intended directory. | |
| Title | WordPress Anti-Malware Security Bruteforce Firewall 4.20.59 Directory Traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-16T15:28:13.494Z
Reserved: 2026-05-16T14:41:49.029Z
Link: CVE-2021-47977
No data.
Status : Received
Published: 2026-05-16T16:16:23.233
Modified: 2026-05-16T16:16:23.233
Link: CVE-2021-47977
No data.
OpenCVE Enrichment
Updated: 2026-05-16T16:45:27Z