Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13671: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in efreja Music Sheet Viewer

0
High
VulnerabilityCVE-2024-13671cvecve-2024-13671cwe-22
Published: Thu Jan 30 2025 (01/30/2025, 13:41:58 UTC)
Source: CVE Database V5
Vendor/Project: efreja
Product: Music Sheet Viewer

Description

CVE-2024-13671 is a high-severity path traversal vulnerability in the efreja Music Sheet Viewer WordPress plugin affecting all versions up to 4. 1. It allows unauthenticated attackers to exploit the read_score_file() function to read arbitrary files on the server. This can lead to disclosure of sensitive information without requiring any user interaction or authentication. The vulnerability arises from improper limitation of pathname inputs, enabling traversal outside intended directories. Although no known exploits are currently reported in the wild, the ease of exploitation and potential impact on confidentiality make this a critical concern for affected sites. Organizations using this plugin should prioritize patching or mitigating this issue to prevent data leakage. The vulnerability primarily affects WordPress sites running this plugin, which are widespread globally, with particular risk in countries with high WordPress adoption. The CVSS score is 7. 5, reflecting high impact on confidentiality with no impact on integrity or availability.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:42:37 UTC

Technical Analysis

CVE-2024-13671 is a path traversal vulnerability classified under CWE-22 found in the efreja Music Sheet Viewer plugin for WordPress. The vulnerability exists in the read_score_file() function, which fails to properly sanitize or restrict the pathname input, allowing attackers to traverse directories and read arbitrary files on the server. This flaw affects all versions up to and including 4.1 of the plugin. Because the vulnerability can be exploited remotely without authentication or user interaction, an attacker can directly request files outside the intended directory scope. The arbitrary file read can expose sensitive server files such as configuration files, credentials, or other private data, potentially leading to further compromise. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. No known public exploits have been reported yet, but the vulnerability is publicly disclosed and thus may be targeted soon. The affected plugin is used on WordPress sites that serve music sheet content, and the vulnerability could be leveraged to gain intelligence on the server environment or escalate attacks. The lack of a patch at the time of disclosure increases the urgency for mitigation.

Potential Impact

The primary impact of CVE-2024-13671 is unauthorized disclosure of sensitive information through arbitrary file reads. Attackers can access configuration files, database credentials, private keys, or other sensitive data stored on the server, which can facilitate further attacks such as privilege escalation, data theft, or site compromise. Since the vulnerability does not affect integrity or availability directly, the main concern is confidentiality breach. Organizations worldwide running WordPress sites with this plugin are at risk, especially those hosting sensitive or regulated data. Exploitation could lead to compliance violations, reputational damage, and increased risk of follow-on attacks. The ease of exploitation without authentication or user interaction means attackers can automate scanning and exploitation at scale, increasing the threat surface. The lack of known exploits in the wild currently limits immediate widespread damage, but the public disclosure raises the likelihood of future exploitation attempts.

Mitigation Recommendations

1. Immediately disable or uninstall the efreja Music Sheet Viewer plugin if it is not essential to your WordPress site functionality. 2. If the plugin is required, restrict access to the plugin’s files and endpoints via web server configuration (e.g., .htaccess rules or firewall rules) to trusted IP addresses only. 3. Monitor web server logs for suspicious requests attempting directory traversal patterns or accessing unexpected files. 4. Implement a Web Application Firewall (WAF) with rules to detect and block path traversal attempts targeting the plugin. 5. Regularly back up site data and configurations to enable recovery in case of compromise. 6. Stay alert for official patches or updates from the vendor and apply them promptly once available. 7. Conduct a security audit of the WordPress environment to identify other potential vulnerabilities or outdated plugins. 8. Limit file permissions on the server to minimize exposure of sensitive files to the web server user. 9. Educate site administrators about the risks of installing unverified plugins and the importance of timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-23T18:07:45.842Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e67b7ef31ef0b59ffd8

Added to database: 2/25/2026, 9:49:27 PM

Last enriched: 2/25/2026, 10:42:37 PM

Last updated: 2/26/2026, 7:02:34 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats