CVE-2021-24227
moderate-risk
Published 2021-04-12
The Jetpack Scan team identified a Local File Disclosure vulnerability in the Patreon WordPress plugin before 1.7.0 that could be abused by anyone visiting the site. Using this attack vector, an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies.
Do I need to act?
!
38.7% chance of exploitation in next 30 days
EPSS score — higher than 61% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Patreon Wordpress
Affected Vendors
References (4)
Third Party Advisory
https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016
Third Party Advisory
https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016
48
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
17/34 · Moderate
Exposure
5/34 · Minimal