First published: Mon Apr 12 2021(Updated: )
The Jetpack Scan team identified a Local File Disclosure vulnerability in the Patreon WordPress plugin before 1.7.0 that could be abused by anyone visiting the site. Using this attack vector, an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Plugin for Patreon | <1.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Local File Disclosure vulnerability is CVE-2021-24227.
CVE-2021-24227 has a severity value of 7.5, which is considered high.
CVE-2021-24227 affects versions up to and excluding 1.7.0 of the Patreon WordPress plugin.
An attacker can exploit CVE-2021-24227 by visiting the site and abusing the Local File Disclosure vulnerability to leak important internal files like wp-config.php.
Yes, you can find more information about CVE-2021-24227 at the following references: [1] https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ [2] https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016