Security for everyone

CVE-2014-4940 Scanner

Detects 'Directory Traversal' vulnerability in Tera Charts plugin for Wordpress affects v. 0.1.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one


Parent Category

CVE-2014-4940 Scanner Detail

The Tera Charts plugin is a tool used for WordPress websites to display interactive visualizations of data. This plugin is a highly-rated graphing and charting tool that is often used for displaying data in an easy-to-understand format. Tera Charts is widely used in various industries, including finance, health care, and marketing.

The CVE-2014-4940 vulnerability is a multiple directory traversal flaw that exists in Tera Charts plugin version 0.1 for WordPress. This vulnerability enables remote attackers to read arbitrary files through the "fn" parameter in the "charts/treemap.php" or "charts/zoomabletreemap.php" directory. Directory traversal attacks are possible when an application doesn't sanitize input correctly, allowing an attacker to traverse the file system and be granted access to sensitive files.

The exploitation of this vulnerability can potentially lead to severe consequences. Cybercriminals could extract sensitive data, such as passwords and login credentials, from compromised files. Attackers can also use the compromised system to deliver malware payloads or steal confidential information, putting both the organization and their customers at risk. Moreover, the exploitation of this vulnerability can negatively impact the organization's reputation, possibly leading to financial damage.

In conclusion, security is a crucial aspect of every business that operates in the digital space. With the pro features of, you can quickly identify and remediate vulnerabilities in your digital assets, including your websites and web applications. offers various features, including machine learning-based vulnerability assessments, a web application firewall, and a robust vulnerability management system to help you stay ahead of the curve and protect your digital assets. By using these advanced security tools and practices, you can significantly reduce the risk of cyberattacks and data breaches.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture