The Grow by Tradedoubler WordPress plugin through 2.0.21 is vulnerable to Local File Inclusion via the component parameter. This makes it possible for attackers to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/ba2f53e0-30be-4f37-91bc-5fa151f1eee7/ | Exploit Third Party Advisory |
Configurations
History
27 May 2025, 18:04
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other | |
First Time |
Tradedoubler
Tradedoubler grow |
|
References | () https://wpscan.com/vulnerability/ba2f53e0-30be-4f37-91bc-5fa151f1eee7/ - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:tradedoubler:grow:*:*:*:*:*:wordpress:*:* |
Information
Published : 2024-08-16 06:15
Updated : 2025-05-27 18:04
NVD link : CVE-2024-6460
Mitre link : CVE-2024-6460
CVE.ORG link : CVE-2024-6460
JSON object : View
Products Affected
tradedoubler
- grow
CWE