The W3 Total Cache plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.8.1 through the publicly exposed debug log file. This makes it possible for unauthenticated attackers to view potentially sensitive information in the exposed log file. For example, the log file may contain nonce values that can be used in further CSRF attacks.
Note: the debug feature must be enabled for this to be a concern, and it is disabled by default.
Metrics
Affected Vendors & Products
References
History
Tue, 14 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 14 Jan 2025 07:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The W3 Total Cache plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.8.1 through the publicly exposed debug log file. This makes it possible for unauthenticated attackers to view potentially sensitive information in the exposed log file. For example, the log file may contain nonce values that can be used in further CSRF attacks. Note: the debug feature must be enabled for this to be a concern, and it is disabled by default. | |
Title | W3 Total Cache <= 2.8.1 Information Exposure via Log Files | |
Weaknesses | CWE-200 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-01-14T07:05:41.364Z
Updated: 2025-01-14T14:47:01.317Z
Reserved: 2024-12-01T20:51:42.434Z
Link: CVE-2024-12008
Vulnrichment
Updated: 2025-01-14T14:46:56.268Z
NVD
Status : Received
Published: 2025-01-14T07:15:25.907
Modified: 2025-01-14T07:15:25.907
Link: CVE-2024-12008
Redhat
No data.