
Cloud Vulnerability DB
A community-led vulnerabilities database
The WP Image Zoom WordPress plugin versions below 1.47 contained a Local File Inclusion (LFI) vulnerability, identified as CVE-2021-24447. The vulnerability was discovered and reported by researcher apple502j on June 23, 2021. This security issue affected the plugin's admin dashboard functionality (WPScan).
The vulnerability stemmed from improper validation of the 'tab' parameter in the plugin's admin interface. When processing this parameter, the plugin used the include_once() function without proper input sanitization, which could lead to local file inclusion issues. The vulnerability received a CVSS score of 4.3 (medium) and was classified under OWASP Top 10 A1: Injection and CWE-22 (WPScan).
The vulnerability could allow attackers with access to the admin dashboard to perform local file inclusion attacks, potentially exposing sensitive server files and information through the WordPress admin interface (WPScan).
The vulnerability was patched in WP Image Zoom version 1.47. Users running vulnerable versions should update to version 1.47 or later to mitigate this security risk (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."