First published: Thu Jul 11 2024(Updated: )
The Duplicator plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 1.5.9. This makes it possible for unauthenticated attackers to obtain the full path to instances, which they may be able to use in combination with other vulnerabilities or to simplify reconnaissance work. On its own, this information is of very limited use.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=1.5.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6210 has a severity rating that indicates it allows information exposure which could be exploited by attackers.
To fix CVE-2024-6210, update the Duplicator plugin to version 1.5.10 or later.
CVE-2024-6210 affects all versions of the Duplicator plugin for WordPress up to and including 1.5.9.
Attackers can utilize CVE-2024-6210 to obtain the full path of instances, which could lead to further exploitation.
CVE-2024-6210 can be exploited by unauthenticated attackers, making it a significant security risk.