Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 18 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 17 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gotmls
Gotmls malware Security And Bruteforce Firewall Wordpress Wordpress wordpress |
|
| Vendors & Products |
Gotmls
Gotmls malware Security And Bruteforce Firewall Wordpress Wordpress wordpress |
Sat, 16 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress Plugin Anti-Malware Security and Bruteforce Firewall 4.20.59 contains a directory traversal vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating the file parameter. Attackers can send requests to the duplicator_download action via admin-ajax.php with path traversal sequences to access sensitive system files outside the intended directory. | |
| Title | WordPress Anti-Malware Security Bruteforce Firewall 4.20.59 Directory Traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-18T18:52:04.602Z
Reserved: 2026-05-16T14:41:49.029Z
Link: CVE-2021-47977
Updated: 2026-05-18T18:51:43.515Z
Status : Deferred
Published: 2026-05-16T16:16:23.233
Modified: 2026-05-18T17:05:46.240
Link: CVE-2021-47977
No data.
OpenCVE Enrichment
Updated: 2026-05-17T17:00:29Z