VYPR
High severity7.5NVD Advisory· Published May 16, 2026

CVE-2021-47977

CVE-2021-47977

Description

WordPress Plugin Anti-Malware Security and Bruteforce Firewall 4.20.59 contains a directory traversal vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating the file parameter. Attackers can send requests to the duplicator_download action via admin-ajax.php with path traversal sequences to access sensitive system files outside the intended directory.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

WordPress Anti-Malware Security plugin ≤4.20.72 has an unauthenticated directory traversal flaw allowing arbitrary file read via the duplicator_download action.

The WordPress Plugin Anti-Malware Security and Bruteforce Firewall versions up to 4.20.72 contain a directory traversal vulnerability (CWE-22) in the duplicator_download action handled through admin-ajax.php [1][2]. The plugin fails to properly sanitize the file parameter, enabling unauthenticated attackers to supply path traversal sequences such as ..\ to read files outside the intended directory.

Attack

Vector No authentication is required; an attacker only needs network access to the WordPress instance. By sending a crafted POST/GET request to /wp-admin/admin-ajax.php?action=duplicator_download&file=..\..\..\Windows\win.ini, the plugin retrieves the requested file's contents [4]. On Windows servers this can expose system files like win.ini, and on Linux servers critical files such as /etc/passwd can be accessed with ../ sequences [2].

Impact

Successful exploitation allows an attacker to read arbitrary files on the server's filesystem, including WordPress configuration files (wp-config.php), database credentials, and sensitive system files. This can lead to further compromise, as disclosed credentials can be used to access databases or escalate privileges [2][4]. The CVSS v4.0 score is 8.1 (High), and the original CVSS v3.1 score is 7.5, reflecting the ease of exploitation and potential for high confidentiality impact.

Mitigation

The vulnerability affects plugin versions ≤4.20.72. The vendor released updates after 4.20.72 to patch the directory traversal flaw, but users must upgrade to a fixed version [1][2]. As of the publication date (May 2026), no workaround is documented; disabling the plugin may be a temporary measure if an upgrade is not possible. The exploit is publicly available via Exploit-DB, increasing the risk of widespread automated scanning [4].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.