CVE-2024-13671: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in efreja Music Sheet Viewer
CVE-2024-13671 is a high-severity path traversal vulnerability in the efreja Music Sheet Viewer WordPress plugin affecting all versions up to 4. 1. It allows unauthenticated attackers to exploit the read_score_file() function to read arbitrary files on the server. This can lead to disclosure of sensitive information without requiring any user interaction or authentication. The vulnerability arises from improper limitation of pathname inputs, enabling traversal outside intended directories. Although no known exploits are currently reported in the wild, the ease of exploitation and potential impact on confidentiality make this a critical concern for affected sites. Organizations using this plugin should prioritize patching or mitigating this issue to prevent data leakage. The vulnerability primarily affects WordPress sites running this plugin, which are widespread globally, with particular risk in countries with high WordPress adoption. The CVSS score is 7. 5, reflecting high impact on confidentiality with no impact on integrity or availability.
AI Analysis
Technical Summary
CVE-2024-13671 is a path traversal vulnerability classified under CWE-22 found in the efreja Music Sheet Viewer plugin for WordPress. The vulnerability exists in the read_score_file() function, which fails to properly sanitize or restrict the pathname input, allowing attackers to traverse directories and read arbitrary files on the server. This flaw affects all versions up to and including 4.1 of the plugin. Because the vulnerability can be exploited remotely without authentication or user interaction, an attacker can directly request files outside the intended directory scope. The arbitrary file read can expose sensitive server files such as configuration files, credentials, or other private data, potentially leading to further compromise. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. No known public exploits have been reported yet, but the vulnerability is publicly disclosed and thus may be targeted soon. The affected plugin is used on WordPress sites that serve music sheet content, and the vulnerability could be leveraged to gain intelligence on the server environment or escalate attacks. The lack of a patch at the time of disclosure increases the urgency for mitigation.
Potential Impact
The primary impact of CVE-2024-13671 is unauthorized disclosure of sensitive information through arbitrary file reads. Attackers can access configuration files, database credentials, private keys, or other sensitive data stored on the server, which can facilitate further attacks such as privilege escalation, data theft, or site compromise. Since the vulnerability does not affect integrity or availability directly, the main concern is confidentiality breach. Organizations worldwide running WordPress sites with this plugin are at risk, especially those hosting sensitive or regulated data. Exploitation could lead to compliance violations, reputational damage, and increased risk of follow-on attacks. The ease of exploitation without authentication or user interaction means attackers can automate scanning and exploitation at scale, increasing the threat surface. The lack of known exploits in the wild currently limits immediate widespread damage, but the public disclosure raises the likelihood of future exploitation attempts.
Mitigation Recommendations
1. Immediately disable or uninstall the efreja Music Sheet Viewer plugin if it is not essential to your WordPress site functionality. 2. If the plugin is required, restrict access to the plugin’s files and endpoints via web server configuration (e.g., .htaccess rules or firewall rules) to trusted IP addresses only. 3. Monitor web server logs for suspicious requests attempting directory traversal patterns or accessing unexpected files. 4. Implement a Web Application Firewall (WAF) with rules to detect and block path traversal attempts targeting the plugin. 5. Regularly back up site data and configurations to enable recovery in case of compromise. 6. Stay alert for official patches or updates from the vendor and apply them promptly once available. 7. Conduct a security audit of the WordPress environment to identify other potential vulnerabilities or outdated plugins. 8. Limit file permissions on the server to minimize exposure of sensitive files to the web server user. 9. Educate site administrators about the risks of installing unverified plugins and the importance of timely updates.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-13671: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in efreja Music Sheet Viewer
Description
CVE-2024-13671 is a high-severity path traversal vulnerability in the efreja Music Sheet Viewer WordPress plugin affecting all versions up to 4. 1. It allows unauthenticated attackers to exploit the read_score_file() function to read arbitrary files on the server. This can lead to disclosure of sensitive information without requiring any user interaction or authentication. The vulnerability arises from improper limitation of pathname inputs, enabling traversal outside intended directories. Although no known exploits are currently reported in the wild, the ease of exploitation and potential impact on confidentiality make this a critical concern for affected sites. Organizations using this plugin should prioritize patching or mitigating this issue to prevent data leakage. The vulnerability primarily affects WordPress sites running this plugin, which are widespread globally, with particular risk in countries with high WordPress adoption. The CVSS score is 7. 5, reflecting high impact on confidentiality with no impact on integrity or availability.
AI-Powered Analysis
Technical Analysis
CVE-2024-13671 is a path traversal vulnerability classified under CWE-22 found in the efreja Music Sheet Viewer plugin for WordPress. The vulnerability exists in the read_score_file() function, which fails to properly sanitize or restrict the pathname input, allowing attackers to traverse directories and read arbitrary files on the server. This flaw affects all versions up to and including 4.1 of the plugin. Because the vulnerability can be exploited remotely without authentication or user interaction, an attacker can directly request files outside the intended directory scope. The arbitrary file read can expose sensitive server files such as configuration files, credentials, or other private data, potentially leading to further compromise. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. No known public exploits have been reported yet, but the vulnerability is publicly disclosed and thus may be targeted soon. The affected plugin is used on WordPress sites that serve music sheet content, and the vulnerability could be leveraged to gain intelligence on the server environment or escalate attacks. The lack of a patch at the time of disclosure increases the urgency for mitigation.
Potential Impact
The primary impact of CVE-2024-13671 is unauthorized disclosure of sensitive information through arbitrary file reads. Attackers can access configuration files, database credentials, private keys, or other sensitive data stored on the server, which can facilitate further attacks such as privilege escalation, data theft, or site compromise. Since the vulnerability does not affect integrity or availability directly, the main concern is confidentiality breach. Organizations worldwide running WordPress sites with this plugin are at risk, especially those hosting sensitive or regulated data. Exploitation could lead to compliance violations, reputational damage, and increased risk of follow-on attacks. The ease of exploitation without authentication or user interaction means attackers can automate scanning and exploitation at scale, increasing the threat surface. The lack of known exploits in the wild currently limits immediate widespread damage, but the public disclosure raises the likelihood of future exploitation attempts.
Mitigation Recommendations
1. Immediately disable or uninstall the efreja Music Sheet Viewer plugin if it is not essential to your WordPress site functionality. 2. If the plugin is required, restrict access to the plugin’s files and endpoints via web server configuration (e.g., .htaccess rules or firewall rules) to trusted IP addresses only. 3. Monitor web server logs for suspicious requests attempting directory traversal patterns or accessing unexpected files. 4. Implement a Web Application Firewall (WAF) with rules to detect and block path traversal attempts targeting the plugin. 5. Regularly back up site data and configurations to enable recovery in case of compromise. 6. Stay alert for official patches or updates from the vendor and apply them promptly once available. 7. Conduct a security audit of the WordPress environment to identify other potential vulnerabilities or outdated plugins. 8. Limit file permissions on the server to minimize exposure of sensitive files to the web server user. 9. Educate site administrators about the risks of installing unverified plugins and the importance of timely updates.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-23T18:07:45.842Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e67b7ef31ef0b59ffd8
Added to database: 2/25/2026, 9:49:27 PM
Last enriched: 2/25/2026, 10:42:37 PM
Last updated: 2/26/2026, 7:02:34 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.