The Hello World plugin for WordPress is vulnerable to Arbitrary File Reading in all versions up to, and including, 2.1.1 via the hello_world_lyric() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
References
Configurations
History
No history.
Information
Published : 2024-10-01 09:15
Updated : 2024-10-07 19:19
NVD link : CVE-2024-9224
Mitre link : CVE-2024-9224
CVE.ORG link : CVE-2024-9224
JSON object : View
Products Affected
kau-boys
- hello_world
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')