CVE-2024-9224
MEDIUMKau-boys Hello World < 2.2.0 - Path Traversal
Title source: ruleDescription
The Hello World plugin for WordPress is vulnerable to Arbitrary File Reading in all versions up to, and including, 2.1.1 via the hello_world_lyric() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Exploits (2)
github
WORKING POC
3 stars
by certuscyber · pythonpoc
https://github.com/certuscyber/cve-pocs/tree/main/CVE-2024-9224
References (3)
Scores
CVSS v3
6.5
EPSS
0.5083
EPSS Percentile
97.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Classification
CWE
CWE-22
Status
published
Affected Products (1)
kau-boys/hello_world
< 2.2.0
Timeline
Published
Oct 01, 2024
Tracked Since
Feb 18, 2026