CVE-2024-12542
linkID <= 0.1.2 - Missing Authorization to Unauthenticated Sensitive Information Exposure
Severity Score
8.6
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
3
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Attend
*SSVC
Descriptions
The linkID plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 0.1.2. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited.
WordPress linkID plugin versions 0.1.2 and below suffers from a missing authorization vulnerability that results in information disclosure.
*Credits:
Francesco Carlucci
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Attend
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-12-11 CVE Reserved
- 2025-01-08 CVE Published
- 2025-01-09 CVE Updated
- 2025-01-10 EPSS Updated
- 2025-01-10 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-862: Missing Authorization
CAPEC
References (5)
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/188668 | 2025-01-14 | |
https://github.com/RandomRobbieBF/CVE-2024-12542 | 2025-01-10 | |
https://github.com/Nxploited/CVE-2024-12542-PoC | 2025-02-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|