mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
24 lines
1.2 KiB
Markdown
24 lines
1.2 KiB
Markdown
### [CVE-2024-12542](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12542)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
The linkID plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 0.1.2. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/20142995/nuclei-templates
|
|
- https://github.com/ARPSyndicate/cve-scores
|
|
- https://github.com/Nxploited/CVE-2024-12542-PoC
|
|
- https://github.com/RandomRobbieBF/CVE-2024-12542
|
|
- https://github.com/cyb3r-w0lf/nuclei-template-collection
|
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
|