Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 18 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 17 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Sun, 17 May 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Google Drive for WordPress 2.2 contains a path traversal vulnerability that allows unauthenticated attackers to read arbitrary files by injecting directory traversal sequences in the file_name parameter. Attackers can send POST requests to gdrive-ajaxs.php with the ajaxstype parameter set to del_fl_bkp and file_name containing traversal sequences ../../wp-config.php to access sensitive configuration files. | |
| Title | Google Drive for WordPress 2.2 Path Traversal RCE via gdrive-ajaxs.php | |
| First Time appeared |
Google
Google google Drive |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:google:google_drive:2.2:*:*:*:*:*:*:* | |
| Vendors & Products |
Google
Google google Drive |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-18T17:57:57.889Z
Reserved: 2026-05-17T11:40:28.812Z
Link: CVE-2018-25326
Updated: 2026-05-18T17:57:43.021Z
Status : Deferred
Published: 2026-05-17T13:16:44.050
Modified: 2026-05-18T17:05:46.240
Link: CVE-2018-25326
No data.
OpenCVE Enrichment
Updated: 2026-05-17T14:00:03Z