CVE-2024-7514

moderate-risk
Published 2024-10-11

The WordPress Comments Import & Export plugin for WordPress is vulnerable to to arbitrary file read due to insufficient file path validation during the comments import process, in versions up to, and including, 2.3.7. This makes it possible for authenticated attackers, with Author-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. The issue was partially fixed in version 2.3.8 and fully fixed in 2.3.9

Do I need to act?

!
47.4% chance of exploitation in next 30 days
EPSS score — higher than 53% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10 Medium
NETWORK / LOW complexity
46
/ 100
moderate-risk
Severity 24/34 · High
Exploitability 17/34 · Moderate
Exposure 5/34 · Minimal