The Debug Tool plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the info() function in all versions up to, and including, 2.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to obtain information from phpinfo(). When WP_DEBUG is enabled, this can be exploited by unauthenticated users as well.
History

Tue, 12 Nov 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 09 Nov 2024 02:45:00 +0000

Type Values Removed Values Added
Description The Debug Tool plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the info() function in all versions up to, and including, 2.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to obtain information from phpinfo(). When WP_DEBUG is enabled, this can be exploited by unauthenticated users as well.
Title Debug Tool <= 2.2 - Missing Authorization to Information Exposure
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-11-09T02:31:59.749Z

Updated: 2024-11-12T20:16:06.212Z

Reserved: 2024-10-31T14:16:20.987Z

Link: CVE-2024-10588

cve-icon Vulnrichment

Updated: 2024-11-12T16:06:19.685Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-09T03:15:05.210

Modified: 2024-11-12T13:56:24.513

Link: CVE-2024-10588

cve-icon Redhat

No data.