Impact
The Trinity Audio WordPress plugin includes an inc/phpinfo.php file that is created during installation and is improperly exposed. This file allows an external user to view internal configuration data. The vulnerability enables an unauthenticated attacker to retrieve sensitive configuration information without performing further exploitation. It falls under CWE-200 and can compromise confidentiality of site settings.
Affected Systems
All WordPress installations using Trinity Audio 5.21.0 or earlier are affected. The vendor is sergiotrinity; the product is the Trinity Audio – Text to Speech AI audio player plugin. No specific patch version details are listed in the dataset, but only versions that include the vulnerable phpinfo file need remediation.
Risk and Exploitability
The CVSS score of 5.3 indicates a medium severity. The EPSS score is less than 1%, suggesting that exploitation is currently uncommon. The vulnerability is not present in CISA’s KEV list. Attackers can exploit it by simply accessing the exposed phpinfo.php file via HTTP, without authentication or additional privileges.
OpenCVE Enrichment