CVE-2020-11738
high-risk
Published 2020-04-13
The Snap Creek Duplicator plugin before 1.3.28 for WordPress (and Duplicator Pro before 3.8.7.1) allows Directory Traversal via ../ in the file parameter to duplicator_download or duplicator_init.
Do I need to act?
!
94.1% chance of exploitation in next 30 days
EPSS score — higher than 6% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (2)
Affected Vendors
References (11)
Not Applicable
https://cwe.mitre.org/data/definitions/23.html
Release Notes
https://snapcreek.com/duplicator/docs/changelog/?lite
Not Applicable
https://cwe.mitre.org/data/definitions/23.html
Release Notes
https://snapcreek.com/duplicator/docs/changelog/?lite
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-...
60
/ 100
high-risk
Severity
26/34 · High
Exploitability
27/34 · High
Exposure
7/34 · Low