Weak configuration vulnerability in File Away 3.9.9.0.1

The File Away plugin for WordPress has a security issue that allows unauthorized individuals to access data without permission. This is because the plugin does not check for the appropriate capabilities when using the ajax() function. This vulnerability exists in all versions, including the latest one (3.9.9.0.1). As a result, attackers who do not have authentication can use a weak algorithm to view the contents of any file on the server. These files may contain confidential information.

Detected in:

File Away open vulnerable versions: >= * <= 3.9.9.0.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.