The Duplicator plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 1.5.9. This makes it possible for unauthenticated attackers to obtain the full path to instances, which they may be able to use in combination with other vulnerabilities or to simplify reconnaissance work. On its own, this information is of very limited use.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-47346 The Duplicator plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 1.5.9. This makes it possible for unauthenticated attackers to obtain the full path to instances, which they may be able to use in combination with other vulnerabilities or to simplify reconnaissance work. On its own, this information is of very limited use.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-01T21:33:04.961Z

Reserved: 2024-06-20T16:46:45.811Z

Link: CVE-2024-6210

cve-icon Vulnrichment

Updated: 2024-08-01T21:33:04.961Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-11T03:15:03.550

Modified: 2024-11-21T09:49:12.083

Link: CVE-2024-6210

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T23:06:22Z

Weaknesses

No weakness.