Authenticated (administrator or higher user role) Local File Inclusion (LFI) vulnerability in Wow-Company's Hover Effects plugin <= 2.1 at WordPress.
References
Link | Resource |
---|---|
https://patchstack.com/database/vulnerability/hover-effects/wordpress-hover-effects-plugin-2-1-authenticated-local-file-inclusion-lfi-vulnerability | Release Notes Third Party Advisory |
https://patchstack.com/database/vulnerability/hover-effects/wordpress-hover-effects-plugin-2-1-authenticated-local-file-inclusion-lfi-vulnerability | Release Notes Third Party Advisory |
https://wordpress.org/plugins/hover-effects/#developers | Product Release Notes |
https://wordpress.org/plugins/hover-effects/#developers | Product Release Notes |
Configurations
History
20 Feb 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://patchstack.com/database/vulnerability/hover-effects/wordpress-hover-effects-plugin-2-1-authenticated-local-file-inclusion-lfi-vulnerability - Release Notes, Third Party Advisory | |
References | () https://wordpress.org/plugins/hover-effects/#developers - Product, Release Notes |
Information
Published : 2022-05-20 21:15
Updated : 2025-02-20 21:15
NVD link : CVE-2022-29447
Mitre link : CVE-2022-29447
JSON object : View
Products Affected
wow-company
- hover_effects
CWE
CWE-552
Files or Directories Accessible to External Parties