Authenticated (administrator or higher user role) Local File Inclusion (LFI) vulnerability in Wow-Company's Hover Effects plugin <= 2.1 at WordPress.
References
Link | Resource |
---|---|
https://patchstack.com/database/vulnerability/hover-effects/wordpress-hover-effects-plugin-2-1-authenticated-local-file-inclusion-lfi-vulnerability | Release Notes Third Party Advisory |
https://wordpress.org/plugins/hover-effects/#developers | Product Release Notes |
https://patchstack.com/database/vulnerability/hover-effects/wordpress-hover-effects-plugin-2-1-authenticated-local-file-inclusion-lfi-vulnerability | Release Notes Third Party Advisory |
https://wordpress.org/plugins/hover-effects/#developers | Product Release Notes |
Configurations
History
21 Nov 2024, 06:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://patchstack.com/database/vulnerability/hover-effects/wordpress-hover-effects-plugin-2-1-authenticated-local-file-inclusion-lfi-vulnerability - Release Notes, Third Party Advisory | |
References | () https://wordpress.org/plugins/hover-effects/#developers - Product, Release Notes | |
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 6.8 |
Information
Published : 2022-05-20 21:15
Updated : 2024-11-21 06:59
NVD link : CVE-2022-29447
Mitre link : CVE-2022-29447
CVE.ORG link : CVE-2022-29447
JSON object : View
Products Affected
wow-company
- hover_effects
CWE
CWE-552
Files or Directories Accessible to External Parties