WordPress Meta News Theme <= 1.1.7 is vulnerable to a high priority Local File Inclusion

High priority Mitigate with Patchstack
<= 1.1.7Vulnerable version(s)
1.1.8Fixed version
24 Oct, 2024 by Patchstack

Get the fastest vulnerability mitigation with Patchstack!

Get started

Risks

CVSS 7.5

This vulnerability is highly dangerous and expected to become exploited.

User Interaction Required

While this vulnerability can be initiated by the role shown in "Required Privilege", successful exploitation requires a privileged user to perform an action — such as clicking a malicious link, visiting a crafted page, or submitting a form.

7.5

Local File Inclusion

This could allow a malicious actor to include local files of the target website and show its output onto the screen. Files which store credentials, such as database credentials, could potentially allow complete database takeover depending on the configuration.

CVSS score is a way to evaluate and rank reported vulnerabilities in a standardized and repeatable way but which is not ideal for WordPress.

Solutions

We advise to mitigate or resolve the vulnerability immediately.

Automatically mitigate vulnerabilities and keep your websites safe.

Patchstack has issued a mitigation rule to block any attacks until you have updated to a fixed version.

Get the fastest vulnerability mitigation with Patchstack!

Get started

Update to version 1.1.8 or later.

Update to version 1.1.8 or later to resolve the vulnerability.

Remove and replace software.

This software was last updated over a year ago and will likely not receive further updates or fixes. Note that deactivating the software does not remove the security threat unless mitigation rule by Patchstack is deployed.

Details

Have additional information or questions about this entry? Let us know.

Timeline

Reported byProfile Imagetahu.datar

28 Sep, 2024

Weekly WordPress security intelligence delivered to your inbox.