Authenticated (administrator or higher user role) Local File Inclusion (LFI) vulnerability in Wow-Company's Hover Effects plugin <= 2.1 at WordPress.
References
| Link | Resource |
|---|---|
| https://patchstack.com/database/vulnerability/hover-effects/wordpress-hover-effects-plugin-2-1-authenticated-local-file-inclusion-lfi-vulnerability | Release Notes Third Party Advisory |
| https://patchstack.com/database/vulnerability/hover-effects/wordpress-hover-effects-plugin-2-1-authenticated-local-file-inclusion-lfi-vulnerability | Release Notes Third Party Advisory |
| https://wordpress.org/plugins/hover-effects/#developers | Product Release Notes |
| https://wordpress.org/plugins/hover-effects/#developers | Product Release Notes |
Configurations
History
20 Feb 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://patchstack.com/database/vulnerability/hover-effects/wordpress-hover-effects-plugin-2-1-authenticated-local-file-inclusion-lfi-vulnerability - Release Notes, Third Party Advisory | |
| References | () https://wordpress.org/plugins/hover-effects/#developers - Product, Release Notes |
Information
Published : 2022-05-20 21:15
Updated : 2025-02-20 21:15
NVD link : CVE-2022-29447
Mitre link : CVE-2022-29447
JSON object : View
Products Affected
wow-company
- hover_effects
CWE
CWE-552
Files or Directories Accessible to External Parties
