Unrated severityNVD Advisory· Published Jul 19, 2025· Updated Apr 8, 2026
GI-Media Library < 3.0 - Directory Traversal
CVE-2015-10136
Description
The GI-Media Library plugin for WordPress is vulnerable to Directory Traversal in versions before 3.0 via the 'fileid' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
Affected products
2<3.0+ 1 more
- (no CPE)range: <3.0
- (no CPE)range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- wordpressa.quantika14.com/repository/index.phpmitre
- github.com/espreto/wpsploit/blob/master/modules/auxiliary/scanner/http/wp_gimedia_library_file_read.rbmitre
- plugins.trac.wordpress.org/changeset/1132677mitre
- wordpress.org/plugins/gi-media-library/mitre
- wpscan.com/vulnerability/7754mitre
- www.rapid7.com/db/modules/auxiliary/scanner/http/wp_gimedia_library_file_read/mitre
- www.wordfence.com/threat-intel/vulnerabilities/id/2f80c3b9-5148-42eb-9137-9c538184cda3mitre
News mentions
0No linked articles in our index yet.