Description
The 简数采集器 plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.6.3 via the __kds_flag functionality that imports featured images. This makes it possible for authenticated attackers, with Adminstrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Problem types
CWE-73 External Control of File Name or Path
Product status
* (semver)
Timeline
| 2025-11-20: | Disclosed |
Credits
Jonas Benjamin Friedli
References
www.wordfence.com/...-c61c-4c73-aa2a-0017299cbca5?source=cve
wordpress.org/plugins/keydatas/