The Grow by Tradedoubler  WordPress plugin through 2.0.21 is vulnerable to Local File Inclusion via the component parameter. This makes it possible for attackers to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
                
            References
                    | Link | Resource | 
|---|---|
| https://wpscan.com/vulnerability/ba2f53e0-30be-4f37-91bc-5fa151f1eee7/ | Exploit Third Party Advisory | 
Configurations
                    History
                    27 May 2025, 18:04
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:tradedoubler:grow:*:*:*:*:*:wordpress:*:* | |
| References | () https://wpscan.com/vulnerability/ba2f53e0-30be-4f37-91bc-5fa151f1eee7/ - Exploit, Third Party Advisory | |
| CWE | NVD-CWE-Other | |
| First Time | 
        
        Tradedoubler grow
         Tradedoubler  | 
29 Aug 2024, 21:35
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 9.8  | 
19 Aug 2024, 13:00
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
16 Aug 2024, 06:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-08-16 06:15
Updated : 2025-05-27 18:04
NVD link : CVE-2024-6460
Mitre link : CVE-2024-6460
CVE.ORG link : CVE-2024-6460
JSON object : View
Products Affected
                tradedoubler
- grow
 
CWE
                