CVE-2024-6544 – Custom Post Limits <= 4.4.1 - Unauthenticated Full Path Disclosure
https://notcve.org/view.php?id=CVE-2024-6544
The Custom Post Limits plugin for WordPress is vulnerable to full path disclosure in all versions up to, and including, 4.4.1. This is due to the plugin utilizing bootstrap and leaving test files with display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website. • https://plugins.trac.wordpress.org/browser/custom-post-limits/trunk/tests/bootstrap.php https://www.wordfence.com/threat-intel/vulnerabilities/id/9cf4a11e-ad28-4a93-9278-1d2d113a4859?source=cve • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2024-7415 – Remember Me Controls <= 2.0.1 - Unauthenticated Full Path Disclosure
https://notcve.org/view.php?id=CVE-2024-7415
The Remember Me Controls plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 2.0.1. This is due to the plugin allowing direct access to the bootstrap.php file which has display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website. • https://plugins.trac.wordpress.org/browser/remember-me-controls/tags/2.0.1/tests/phpunit/bootstrap.php https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3146603%40remember-me-controls&new=3146603%40remember-me-controls&sfp_email=&sfph_mail= https://www.wordfence.com/threat-intel/vulnerabilities/id/01707346-86c2-45c8-a2c9-81a147506fa4?source=cve • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2024-7413 – Obfuscate Email <= 3.8.1 - Unauthenticated Full Path Disclosure
https://notcve.org/view.php?id=CVE-2024-7413
The Obfuscate Email plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.8.1. This is due to the plugin allowing direct access to the bootstrap.php file which has display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website. • https://plugins.trac.wordpress.org/browser/obfuscate-email/trunk/phpunit/bootstrap.php https://www.wordfence.com/threat-intel/vulnerabilities/id/228079da-3c69-423c-b69b-f1a670258772?source=cve • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2024-7382 – Linkify Text <= 1.9.1 - Unauthenticated Full Path Disclosure
https://notcve.org/view.php?id=CVE-2024-7382
The Linkify Text plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.9.1. This is due to the plugin utilizing bootstrap and leaving test files with display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own and requires another vulnerability to be present for damage to an affected website. • https://plugins.trac.wordpress.org/browser/linkify-text/tags/1.9.1/tests/bootstrap.php#L8 https://www.wordfence.com/threat-intel/vulnerabilities/id/107548a1-3b5b-4838-815b-32b86e1b7ff5?source=cve • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2024-7412 – No Update Nag <= 1.4.12 - Unauthenticated Full Path Disclosure
https://notcve.org/view.php?id=CVE-2024-7412
The No Update Nag plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.4.12. This is due to the plugin allowing direct access to the bootstrap.php file which has display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website. • https://plugins.trac.wordpress.org/browser/no-update-nag/trunk/tests/phpunit/bootstrap.php https://www.wordfence.com/threat-intel/vulnerabilities/id/77faa23e-4475-43d9-b475-fe999cda7b62?source=cve • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •