CVE-2024-9224
CVSS 3.1 Score 6.5 of 10 (medium)
Details
Summary
CVE-2024-9224 identifies a vulnerability in the Hello World plugin for WordPress, affecting all versions up to and including 2.1.1, which allows authenticated attackers with subscriber-level access to read arbitrary files on the server through the hello_world_lyric() function. This flaw poses a significant risk as it can expose sensitive information, leading to potential data breaches. The severity of the vulnerability is rated as medium, with a CVSS base score of 6.5 and a high confidentiality impact. To remediate this issue, users are advised to update the Hello World plugin to a version beyond 2.1.1 immediately. Organizations using affected versions should be cautious of unauthorized access attempts that could exploit this flaw for information theft.
Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.
Advisories, Assessments, and Mitigations
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions