Impact
The Yame | Link In Bio plugin for WordPress contains a publicly accessible phpinfo.php script that exposes sensitive configuration details. An unauthenticated attacker can read this file and obtain potentially confidential information, such as database credentials, server environment variables, and other sensitive data that should be protected.
Affected Systems
The vulnerability affects the Yame | Link In Bio plugin for WordPress in all versions up to and including 0.9.0. No other versions or products are listed as impacted.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate risk. The EPSS score of less than 1% suggests a very low likelihood of active exploitation at this time, and the vulnerability is not listed in CISA’s KEV catalog. Because the exploit is unauthenticated and relies on a publicly exposed file, a potential attacker can reach the vulnerable endpoint simply by navigating to the phpinfo.php URL on the affected site.
OpenCVE Enrichment
EUVD