The linkID plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 0.1.2. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited.
Metrics
Affected Vendors & Products
References
History
Thu, 09 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 09 Jan 2025 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The linkID plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 0.1.2. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited. | |
Title | linkID <= 0.1.2 - Missing Authorization to Unauthenticated Sensitive Information Exposure | |
Weaknesses | CWE-862 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-01-09T11:11:04.098Z
Updated: 2025-01-09T14:28:14.580Z
Reserved: 2024-12-11T20:42:50.118Z
Link: CVE-2024-12542
Vulnrichment
Updated: 2025-01-09T14:28:09.902Z
NVD
Status : Received
Published: 2025-01-09T11:15:14.550
Modified: 2025-01-09T11:15:14.550
Link: CVE-2024-12542
Redhat
No data.