CVE-2024-9224

The Hello World plugin for WordPress is vulnerable to Arbitrary File Reading in all versions up to, and including, 2.1.1 via the hello_world_lyric() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kau-boys:hello_world:*:*:*:*:*:wordpress:*:*

History

No history.

Information

Published : 2024-10-01 09:15

Updated : 2024-10-07 19:19


NVD link : CVE-2024-9224

Mitre link : CVE-2024-9224

CVE.ORG link : CVE-2024-9224


JSON object : View

Products Affected

kau-boys

  • hello_world
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')