From this webpage screenshot, the following key information about the vulnerability can be obtained: 1. Vulnerability Name: Social Web Suite - Social Media Auto Post, Social Media Auto Publish <= 4.1.11 - Directory Traversal to Arbitrary File Download 2. Vulnerability Type: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 3. CVSS Score: 3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N 4. CVE ID: CVE-2024-8352 5. CVSS Score: 7.5 (High) 6. Public Release Date: October 2, 2024 7. Last Updated Date: October 3, 2024 8. Researcher: Thanh Nam Tran 9. Affected Versions: <= 4.1.11 10. Fixed Version: 4.1.12 11. Vulnerability Description: This vulnerability allows unauthorized attackers to perform directory traversal via the download_log function, enabling them to read arbitrary files on the server, which may contain sensitive information. 12. Reference Link: plugins.trac.wordpress.org 13. Vulnerability Details: Includes software type, software slug, whether fixed, remediation advice, affected versions, and fixed versions. 14. Copyright and Licensing Information: This record is copyrighted and licensed under MITRE’s Common Vulnerabilities and Exposures (CVE) license. 15. Vulnerability Database: Wordfence Intelligence’s WordPress vulnerability database is free and accessible via API for querying. This information helps users understand the severity, scope of impact, and how to remediate or avoid the vulnerability.