
Cloud Vulnerability DB
A community-led vulnerabilities database
The linkID plugin for WordPress contains a vulnerability (CVE-2024-12542) discovered and disclosed on January 9, 2025. The vulnerability affects all versions up to and including 0.1.2, allowing unauthorized access to data due to a missing capability check when including the 'phpinfo' function. This security flaw exists regardless of whether the plugin is activated or not (NVD Database).
The vulnerability is classified as CWE-862 (Missing Authorization) with a CVSS v3.1 base score of 8.6 (HIGH). The attack vector is characterized as network-accessible (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N). The scope is changed (S:C) with high confidentiality impact (C:H) but no impact on integrity (I:N) or availability (A:N) (NVD Database).
When exploited, this vulnerability allows unauthenticated attackers to read configuration settings and predefined variables on the site's server. The high confidentiality impact rating indicates that sensitive information could be exposed through the phpinfo function (NVD Database).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."