The Grow by Tradedoubler WordPress plugin through 2.0.21 is vulnerable to Local File Inclusion via the component parameter. This makes it possible for attackers to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/ba2f53e0-30be-4f37-91bc-5fa151f1eee7/ | Exploit Third Party Advisory |
Configurations
History
27 May 2025, 18:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/ba2f53e0-30be-4f37-91bc-5fa151f1eee7/ - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:tradedoubler:grow:*:*:*:*:*:wordpress:*:* | |
CWE | NVD-CWE-Other | |
First Time |
Tradedoubler
Tradedoubler grow |
29 Aug 2024, 21:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
19 Aug 2024, 13:00
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
16 Aug 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-16 06:15
Updated : 2025-05-27 18:04
NVD link : CVE-2024-6460
Mitre link : CVE-2024-6460
CVE.ORG link : CVE-2024-6460
JSON object : View
Products Affected
tradedoubler
- grow
CWE