First published: Wed Oct 02 2024(Updated: )
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Mestres do WP Checkout Mestres WP allows PHP Local File Inclusion.This issue affects Checkout Mestres WP: from n/a through 8.6.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mestres do WP Checkout | <=8.6 | |
Mestres Checkout | <=8.6 |
Update to 8.6.1 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-44030 is classified as a high severity vulnerability due to its potential for local file inclusion.
To remediate CVE-2024-44030, update the Checkout Mestres WP to a version beyond 8.6.
CVE-2024-44030 affects all versions of Checkout Mestres WP up to and including version 8.6.
CVE-2024-44030 is caused by improper limitations of pathname that allow directory traversal and local file inclusion.
Yes, CVE-2024-44030 specifically affects the Checkout Mestres WP plugin used in WordPress.