CVE-2024-9224

CVSS 3.1 Score 6.5 of 10 (medium)

Details

Published Oct 1, 2024
Updated: Oct 4, 2024
CWE ID 22

Summary

CVE-2024-9224 identifies a vulnerability in the Hello World plugin for WordPress, affecting all versions up to and including 2.1.1, which allows authenticated attackers with subscriber-level access to read arbitrary files on the server through the hello_world_lyric() function. This flaw poses a significant risk as it can expose sensitive information, leading to potential data breaches. The severity of the vulnerability is rated as medium, with a CVSS base score of 6.5 and a high confidentiality impact. To remediate this issue, users are advised to update the Hello World plugin to a version beyond 2.1.1 immediately. Organizations using affected versions should be cautious of unauthorized access attempts that could exploit this flaw for information theft.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-9224 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions