#VU47432 Improper access control in HyperComments
Published: October 8, 2020
HyperComments
Alexandr Bazyk
Description
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to the affected plugin does not validate and sanitise user input which is being concatenated to create a file path, passed to unlink(). A remote attacker can bypass implemented security restrictions and cause arbitrary file deletion.