First published: Fri Jul 12 2024(Updated: )
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in N.O.U.S. Open Useful and Simple Event post allows PHP Local File Inclusion.This issue affects Event post: from n/a through 5.9.5.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
N.O.U.S. Open Useful and Simple Event post | <=5.9.5 | |
WordPress Event post plugin | <=5.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38735 is classified as a high severity vulnerability due to its potential for local file inclusion exploits.
To fix CVE-2024-38735, update your N.O.U.S. Open Useful and Simple Event post software or the WordPress Event post plugin to version 5.9.6 or later.
CVE-2024-38735 affects N.O.U.S. Open Useful and Simple Event post and the WordPress Event post plugin up to version 5.9.5.
CVE-2024-38735 enables attackers to perform local file inclusion, which can lead to unauthorized file access on the server.
Until you can update, consider restricting access to the affected scripts and reviewing your server’s file permissions to mitigate risks.