CVE-2024-6459

The News Element Elementor Blog Magazine WordPress plugin before 1.0.6 is vulnerable to Local File Inclusion via the template parameter. This makes it possible for unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:webangon:news_element:*:*:*:*:*:wordpress:*:*

History

27 May 2025, 17:48

Type Values Removed Values Added
First Time Webangon
Webangon news Element
References () https://wpscan.com/vulnerability/330359fa-d085-4923-b5a8-c0e2e5267247/ - () https://wpscan.com/vulnerability/330359fa-d085-4923-b5a8-c0e2e5267247/ - Exploit, Third Party Advisory
CWE NVD-CWE-Other
CPE cpe:2.3:a:webangon:news_element:*:*:*:*:*:wordpress:*:*

06 Sep 2024, 17:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

19 Aug 2024, 13:00

Type Values Removed Values Added
Summary
  • (es) El complemento News Element Elementor Blog Magazine de WordPress anterior a 1.0.6 es vulnerable a la inclusión de archivos locales a través del parámetro de plantilla. Esto hace posible que un atacante no autenticado incluya y ejecute archivos PHP en el servidor, permitiendo la ejecución de cualquier código PHP en esos archivos.

17 Aug 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-17 06:15

Updated : 2025-05-27 17:48


NVD link : CVE-2024-6459

Mitre link : CVE-2024-6459

CVE.ORG link : CVE-2024-6459


JSON object : View

Products Affected

webangon

  • news_element