The Hello World plugin for WordPress is vulnerable to Arbitrary File Reading in all versions up to, and including, 2.1.1 via the hello_world_lyric() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 07 Oct 2024 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Kau-boys
Kau-boys hello World
CPEs cpe:2.3:a:kau-boys:hello_world:*:*:*:*:*:wordpress:*:*
Vendors & Products Kau-boys
Kau-boys hello World

Tue, 01 Oct 2024 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Oct 2024 08:45:00 +0000

Type Values Removed Values Added
Description The Hello World plugin for WordPress is vulnerable to Arbitrary File Reading in all versions up to, and including, 2.1.1 via the hello_world_lyric() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Title Hello World <= 2.1.1 - Authenticated (Subscriber+) Arbitrary File Read
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-10-01T13:53:33.447Z

Reserved: 2024-09-26T17:46:36.496Z

Link: CVE-2024-9224

cve-icon Vulnrichment

Updated: 2024-10-01T13:53:28.184Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-01T09:15:07.190

Modified: 2024-10-07T19:19:38.157

Link: CVE-2024-9224

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.