First published: Fri Aug 30 2024(Updated: )
The Web Directory Free WordPress plugin before 1.7.3 does not validate a parameter before using it in an include(), which could lead to Local File Inclusion issues.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Web Directory | <1.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3673 has a severity rating that could potentially allow local file inclusion vulnerabilities in the affected WordPress plugin.
To fix CVE-2024-3673, update the Web Directory Free WordPress plugin to version 1.7.3 or later.
CVE-2024-3673 introduces Local File Inclusion vulnerabilities due to improper validation of parameters.
Versions of the Web Directory Free WordPress plugin prior to 1.7.3 are affected by CVE-2024-3673.
The vendor responsible for CVE-2024-3673 is Web Directory, which develops the Free WordPress plugin.