
Cloud Vulnerability DB
A community-led vulnerabilities database
Directory traversal vulnerability was discovered in Snow Monkey Forms versions v5.0.6 and earlier. This vulnerability allows remote unauthenticated attackers to obtain sensitive information, alter the website, or cause a denial-of-service (DoS) condition. The vulnerability was reported by Monkey Wrench Inc. and was assigned CVE-2023-28413 (JVN Advisory).
The vulnerability is classified as a Directory Traversal (CWE-22) with a CVSS v3.1 Base Score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The vulnerability allows malicious form submitters to access files on the server that should not be accessible, potentially leading to server resource exhaustion (DoS) or WordPress reinstallation (RCE) (Snow Monkey Release, JVN Advisory).
The exploitation of this vulnerability can lead to multiple severe consequences: unauthorized access to sensitive information, website alteration capabilities, and potential denial-of-service conditions. Additionally, attackers could cause server resource exhaustion and potentially force WordPress reinstallation (JVN Advisory).
Users are strongly advised to update to Snow Monkey Forms version 5.0.7 or later. The update can be performed through the WordPress dashboard. If the update notification is not visible in the dashboard, users can manually download the latest version of Snow Monkey Forms from WordPress.org and upload it through the WordPress dashboard (Snow Monkey Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."