CVE-2019-25213
CRITICAL EXPLOITED NUCLEIWordPress Advanced Access Manager <5.9.8.1 - Info Disclosure
Title source: llmDescription
The Advanced Access Manager plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Read in versions up to, and including, 5.9.8.1 due to insufficient validation on the aam-media parameter. This allows unauthenticated attackers to read any file on the server, including sensitive files such as wp-config.php
Nuclei Templates (1)
WordPress Advanced Access Manager - Path Traversal
CRITICALVERIFIEDby riteshs4hu
References (2)
Scores
CVSS v3
9.8
EPSS
0.4613
EPSS Percentile
97.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2024-10-15
CWE
CWE-22
Status
published
Products (2)
vasyltech/advanced_access_manager
< 5.9.8.1
vasyltech/Advanced Access Manager – Access Governance for WordPress
< 5.9.9
Published
Oct 16, 2024
Tracked Since
Feb 18, 2026