← Back to CVEs
CVE-2015-7683
N/ADescription
Absolute path traversal vulnerability in Font.php in the Font plugin before 7.5.1 for WordPress allows remote administrators to read arbitrary files via a full pathname in the url parameter to AjaxProxy.php.
CVE Details
CVSS v3.1 ScoreN/A
Published10/16/2015
Last Modified4/12/2025
Sourcenvd
Honeypot Sightings0
Affected Products
font_project:font
Weaknesses (CWE)
CWE-22
References
http://www.securityfocus.com/archive/1/536670/100/0/threaded(cve@mitre.org)
https://wordpress.org/plugins/font/changelog/(cve@mitre.org)
https://wpvulndb.com/vulnerabilities/8214(cve@mitre.org)
http://packetstormsecurity.com/files/133930/WordPress-Font-7.5-Path-Traversal.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/536670/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
https://wordpress.org/plugins/font/changelog/(af854a3a-2127-422b-91ae-364da2661108)
https://wpvulndb.com/vulnerabilities/8214(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.