The Grow by Tradedoubler WordPress plugin through 2.0.21 is vulnerable to Local File Inclusion via the component parameter. This makes it possible for attackers to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
History

Thu, 29 Aug 2024 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Tradedoubler
Tradedoubler grow
CPEs cpe:2.3:a:tradedoubler:grow:*:*:*:*:*:*:*:*
Vendors & Products Tradedoubler
Tradedoubler grow
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 16 Aug 2024 06:15:00 +0000

Type Values Removed Values Added
Description The Grow by Tradedoubler WordPress plugin through 2.0.21 is vulnerable to Local File Inclusion via the component parameter. This makes it possible for attackers to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
Title Grow by Tradedoubler <= 2.0.21 - Unauthenticated LFI
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2024-08-16T06:00:02.447Z

Updated: 2024-09-13T14:06:36.456Z

Reserved: 2024-07-02T20:48:44.699Z

Link: CVE-2024-6460

cve-icon Vulnrichment

Updated: 2024-08-19T20:49:50.634Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-16T06:15:04.170

Modified: 2024-08-29T21:35:12.753

Link: CVE-2024-6460

cve-icon Redhat

No data.