CVE-2015-10136
HIGHGI-Media Library <3.0 - Path Traversal
Title source: llmDescription
The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
Exploits (1)
metasploit
WORKING POC
by Unknown · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/wp_gimedia_library_file_read.rb
References (7)
Scores
CVSS v3
7.5
EPSS
0.4860
EPSS Percentile
97.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Classification
CWE
CWE-22
Status
published
Affected Products (1)
zishanj/gi-media-library
< 3.0
Timeline
Published
Jul 19, 2025
Tracked Since
Feb 18, 2026