The News Element Elementor Blog Magazine WordPress plugin before 1.0.6 is vulnerable to Local File Inclusion via the template parameter. This makes it possible for unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/330359fa-d085-4923-b5a8-c0e2e5267247/ | Exploit Third Party Advisory |
Configurations
History
27 May 2025, 17:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:webangon:news_element:*:*:*:*:*:wordpress:*:* | |
References | () https://wpscan.com/vulnerability/330359fa-d085-4923-b5a8-c0e2e5267247/ - Exploit, Third Party Advisory | |
First Time |
Webangon
Webangon news Element |
|
CWE | NVD-CWE-Other |
17 Aug 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-17 06:15
Updated : 2025-05-27 17:48
NVD link : CVE-2024-6459
Mitre link : CVE-2024-6459
JSON object : View
Products Affected
webangon
- news_element
CWE