Sensitive Information Exposure in WP-Cumulus Plugin for WordPress
CVE-2009-4170
Currently unrated
Summary
The WP-Cumulus plugin version 1.20 and potentially other versions enables remote attackers to exploit a flaw by sending crafted requests to the wp-cumulus.php endpoint. This could result in the disclosure of sensitive information, such as the installation path, through an error message. Proper validation and sanitization of inputs are critical to mitigate such vulnerabilities.
References
Timeline
Vulnerability published
Vulnerability Reserved