Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vmxx-j32m-f59g

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In the WordPress plugin, Fast Velocity Minify before 2.7.7, the full web root path to the running WordPress application can be discovered. In order to exploit this vulnerability, FVM Debug Mode needs to be enabled and an admin-ajax request needs to call the fastvelocity_min_files action.

In the WordPress plugin, Fast Velocity Minify before 2.7.7, the full web root path to the running WordPress application can be discovered. In order to exploit this vulnerability, FVM Debug Mode needs to be enabled and an admin-ajax request needs to call the fastvelocity_min_files action.

EPSS

Процентиль: 55%
0.00328
Низкий

Связанные уязвимости

CVSS3: 4.3
nvd
около 6 лет назад

In the WordPress plugin, Fast Velocity Minify before 2.7.7, the full web root path to the running WordPress application can be discovered. In order to exploit this vulnerability, FVM Debug Mode needs to be enabled and an admin-ajax request needs to call the fastvelocity_min_files action.

EPSS

Процентиль: 55%
0.00328
Низкий