CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-35743

High Severity
Sc_filechecker_project
SVRS
61/100

CVSSv3
6.5/10

EPSS
0.00201/1

CVE-2024-35743 is a path traversal vulnerability affecting Siteclean SC filechecker versions 0.6 and earlier, allowing for potential file manipulation. This flaw enables attackers to bypass security restrictions and access files or directories outside of the intended restricted directory. The SOCRadar Vulnerability Risk Score (SVRS) for this CVE is 61, indicating a moderate risk.

While the CVSS score is 6.5, the SVRS provides additional context by incorporating real-world threat intelligence. This vulnerability could be exploited to read sensitive files, overwrite critical system configurations, or even execute arbitrary code. The 'In The Wild' tag indicates that this CVE is actively being exploited, increasing the urgency for patching and mitigation. Organizations using Siteclean SC filechecker should immediately update to a patched version to prevent potential attacks and data breaches stemming from this serious security flaw.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:H
UI:N
S:U
C:N
I:H
A:H
2024-06-10

2024-06-12

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-35743 | Siteclean SC Filechecker Plugin up to 0.6 on WordPress path traversal
vuldb.com2024-06-10
CVE-2024-35743 | Siteclean SC Filechecker Plugin up to 0.6 on WordPress path traversal | A vulnerability, which was classified as critical, was found in Siteclean SC Filechecker Plugin up to 0.6 on WordPress. This affects an unknown part. The manipulation leads to path traversal. This vulnerability is uniquely identified as CVE-2024-35743. It is possible to initiate the attack remotely. There is no exploit available.
cve-2024-35743
domains
urls
cves

Social Media

CVE-2024-35743 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Siteclean SC filechecker allows Path Traversal, File Manipulation.This issue affects SC filechecker: f... https://t.co/Zb2ar41qB4
0
0
0
[CVE-2024-35743: 8.6/HIGH] Vulnerability in Siteclean SC filechecker allows Path Traversal & File Manipulation. Versions affected: n/a to 0.6. Enhance cyber security now! https://t.co/Un0WUzUZ8w
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
AppSc_filechecker_projectsc_filechecker

References

ReferenceLink
[email protected]https://patchstack.com/database/vulnerability/wp-file-checker/wordpress-sc-filechecker-plugin-0-6-arbitrary-file-deletion-vulnerability?_s_id=cve

CWE Details

CWE IDCWE NameDescription
CWE-22Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence