CVE-2015-10136
HIGHGI-Media Library <3.0 - Path Traversal
Title source: llmDescription
The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
Exploits (1)
metasploit
WORKING POC
by Unknown · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/wp_gimedia_library_file_read.rb
References (7)
Scores
CVSS v3
7.5
EPSS
0.5472
EPSS Percentile
98.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-22
Status
published
Products (2)
zishanj/GI-Media Library
< 3.0
zishanj/gi-media-library
< 3.0
Published
Jul 19, 2025
Tracked Since
Feb 18, 2026