CVE-2024-9224

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22)

Published: Oct 1, 2024 / Updated: 49d ago

010
CVSS 6.5EPSS 0.06%Medium
CVE info copied to clipboard

The Hello World plugin for WordPress is vulnerable to Arbitrary File Reading in all versions up to, and including, 2.1.1 via the hello_world_lyric() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Timeline

First Article

Feedly found the first article mentioning CVE-2024-9224. See article

Oct 1, 2024 at 8:43 AM / Vulners.com RSS Feed
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Oct 1, 2024 at 8:43 AM
CVE Assignment

NVD published the first details for CVE-2024-9224

Oct 1, 2024 at 9:15 AM
CVSS

A CVSS base score of 6.5 has been assigned.

Oct 1, 2024 at 9:20 AM / nvd
EPSS

EPSS Score was set to: 0.06% (Percentile: 25.6%)

Oct 2, 2024 at 10:19 AM
Static CVE Timeline Graph

Affected Systems

Kau-boys/hello_world
+null more

Attack Patterns

CAPEC-126: Path Traversal
+null more

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI