CVE-2024-31394
moderate-risk
Published 2024-05-22
Directory traversal vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with an editor or higher privilege who can log in to the product may obtain arbitrary files on the server.
Do I need to act?
~
1.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
Vendor Advisory
https://developer.a-blogcms.jp/blog/news/JVN-70977403.html
Third Party Advisory
https://jvn.jp/en/jp/JVN70977403/
Vendor Advisory
https://developer.a-blogcms.jp/blog/news/JVN-70977403.html
Third Party Advisory
https://jvn.jp/en/jp/JVN70977403/
33
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
4/34 · Minimal
Exposure
5/34 · Minimal