The WordPress Where I Was, Where I Will Be plugin (<= 1.1.1) allows unauthenticated remote file inclusion, potentially leading to code execution
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
![]() | WordPress Where I Was, Where I Will Be Plugin <= 1.1.1 is vulnerable to Remote File Inclusion | 14 Jun 202400:00 | – | patchstack |
![]() | CVE-2024-5577 | 14 Jun 202408:15 | – | nvd |
![]() | CVE-2024-5577 Where I Was, Where I Will Be <= 1.1.1 - Unauthenticated Remote File Inclusion | 14 Jun 202407:31 | – | vulnrichment |
![]() | Where I Was, Where I Will Be <= 1.1.1 - Unauthenticated Remote File Inclusion | 13 Jun 202400:00 | – | wpvulndb |
![]() | CVE-2024-5577 Where I Was, Where I Will Be <= 1.1.1 - Unauthenticated Remote File Inclusion | 14 Jun 202407:31 | – | cvelist |
![]() | Wordfence Intelligence Weekly WordPress Vulnerability Report (June 10, 2024 to June 16, 2024) | 20 Jun 202413:40 | – | wordfence |
[
{
"vendor": "mcnardelli",
"product": "Where I Was, Where I Will Be",
"versions": [
{
"version": "*",
"status": "affected",
"lessThanOrEqual": "1.1.1",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo