The News Element Elementor Blog Magazine WordPress plugin before 1.0.6 is vulnerable to Local File Inclusion via the template parameter. This makes it possible for unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/330359fa-d085-4923-b5a8-c0e2e5267247/ | Exploit Third Party Advisory |
Configurations
History
27 May 2025, 17:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:webangon:news_element:*:*:*:*:*:wordpress:*:* | |
CWE | NVD-CWE-Other | |
First Time |
Webangon news Element
Webangon |
|
References | () https://wpscan.com/vulnerability/330359fa-d085-4923-b5a8-c0e2e5267247/ - Exploit, Third Party Advisory |
06 Sep 2024, 17:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
19 Aug 2024, 13:00
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
17 Aug 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-17 06:15
Updated : 2025-05-27 17:48
NVD link : CVE-2024-6459
Mitre link : CVE-2024-6459
CVE.ORG link : CVE-2024-6459
JSON object : View
Products Affected
webangon
- news_element
CWE