The BeeTeam368 Extensions plugin for WordPress is...
High severity
Unreviewed
Published
Jun 28, 2025
to the GitHub Advisory Database
•
Updated Jun 28, 2025
Description
Published by the National Vulnerability Database
Jun 28, 2025
Published to the GitHub Advisory Database
Jun 28, 2025
Last updated
Jun 28, 2025
The BeeTeam368 Extensions plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.3.4 via the handle_remove_temp_file() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory. This vulnerability can be used to delete the wp-config.php file, which can be leveraged into a site takeover.
References