CVE-2024-9224

MEDIUM

Kau-boys Hello World < 2.2.0 - Path Traversal

Title source: rule

Description

The Hello World plugin for WordPress is vulnerable to Arbitrary File Reading in all versions up to, and including, 2.1.1 via the hello_world_lyric() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

Exploits (2)

github WORKING POC 3 stars
by certuscyber · pythonpoc
https://github.com/certuscyber/cve-pocs/tree/main/CVE-2024-9224
nomisec WORKING POC 1 stars
by RandomRobbieBF · poc
https://github.com/RandomRobbieBF/CVE-2024-9224

Scores

CVSS v3 6.5
EPSS 0.5083
EPSS Percentile 97.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Classification

CWE
CWE-22
Status published

Affected Products (1)

kau-boys/hello_world < 2.2.0

Timeline

Published Oct 01, 2024
Tracked Since Feb 18, 2026