{"api_version":"1","generated_at":"2026-04-23T22:11:18+00:00","cve":"CVE-2021-24966","urls":{"html":"https://cve.report/CVE-2021-24966","api":"https://cve.report/api/cve/CVE-2021-24966.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-24966","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-24966"},"summary":{"title":"CVE-2021-24966","description":"The Error Log Viewer WordPress plugin through 1.1.1 does not validate the path of the log file to clear, allowing high privilege users to clear arbitrary files on the web server, including those outside of the blog folder","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2022-03-14 15:15:00","updated_at":"2022-03-20 03:30:00"},"problem_types":["CWE-73"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0","name":"https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0","refsource":"MISC","tags":[],"title":"Attention Required! | Cloudflare","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-24966","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-24966","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Ceylan Bozogullarindan","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"24966","vulnerable":"1","versionEndIncluding":"1.1.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"bestwebsoft","cpe5":"error_log_viewer","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2021-24966","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"Error Log Viewer Plugin <= 1.1.1 - Admin+ Arbitrary File Clearing"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Error Log Viewer by BestWebSoft","version":{"version_data":[{"version_affected":"<=","version_name":"1.1.1","version_value":"1.1.1"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The Error Log Viewer WordPress plugin through 1.1.1 does not validate the path of the log file to clear, allowing high privilege users to clear arbitrary files on the web server, including those outside of the blog folder"}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0","name":"https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-73 External Control of File Name or Path","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Ceylan Bozogullarindan"}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-03-14 15:15:00","lastModifiedDate":"2022-03-20 03:30:00","problem_types":["CWE-73"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":4.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.2,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:bestwebsoft:error_log_viewer:*:*:*:*:*:wordpress:*:*","versionEndIncluding":"1.1.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"24966","Ordinal":"199728","Title":"CVE-2021-24966","CVE":"CVE-2021-24966","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"24966","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}