First published: Thu Jul 11 2024(Updated: )
The Branda – White Label WordPress, Custom Login Page Customizer plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.4.18. This is due the plugin utilizing composer without preventing direct access to the files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPMU DEV Branda | <3.4.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6554 has a severity rating that indicates a potential risk of information exposure through Full Path Disclosure.
To fix CVE-2024-6554, update the Branda plugin to version 3.4.19 or later.
Full Path Disclosure in CVE-2024-6554 allows attackers to access sensitive file paths in the server, leading to potential data exposure.
All versions of the Branda plugin up to and including 3.4.18 are affected by CVE-2024-6554.
The vendor for the affected software in CVE-2024-6554 is WPMU DEV.