cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2021-25021,https://securityvulnerability.io/vulnerability/CVE-2021-25021,OMGF < 4.5.12 - Admin+ Arbitrary Folder Deletion via Path Traversal,"The OMGF | Host Google Fonts Locally WordPress plugin before 4.5.12 does not validate the cache directory setting, allowing high privilege users to use a path traversal vector and delete arbitrary folders when uninstalling the plugin",Wordpress,Omgf | Host Google Fonts Locally,4.9,MEDIUM,0.0005600000149570405,false,,false,false,false,,false,false,2022-01-03T12:49:14.000Z,0 CVE-2021-24639,https://securityvulnerability.io/vulnerability/CVE-2021-24639,OMGF < 4.5.4 - Subscriber+ Arbitrary File/Folder Deletion,"The OMGF WordPress plugin before 4.5.4 does not enforce path validation, authorisation and CSRF checks in the omgf_ajax_empty_dir AJAX action, which allows any authenticated users to delete arbitrary files or folders on the server.",Wordpress,Omgf | Host Google Fonts Locally,8.1,HIGH,0.0007399999885819852,false,,false,false,false,,false,false,2021-09-20T10:06:45.000Z,0 CVE-2021-24638,https://securityvulnerability.io/vulnerability/CVE-2021-24638,OMGF < 4.5.4 - Unauthenticated Path Traversal in REST API,"The OMGF WordPress plugin before 4.5.4 does not escape or validate the handle parameter of the REST API, which allows unauthenticated users to perform path traversal and overwrite arbitrary CSS file with Google Fonts CSS, or download fonts uploaded on Google Fonts website.",Wordpress,Omgf | Host Google Fonts Locally,9.1,CRITICAL,0.0019499999471008778,false,,false,false,false,,false,false,2021-09-20T10:06:43.000Z,0