First published: Tue Oct 01 2024(Updated: )
The Hello World plugin for WordPress is vulnerable to Arbitrary File Reading in all versions up to, and including, 2.1.1 via the hello_world_lyric() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Kau-boys Hello World Wordpress | <2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.