Description
The Hello World plugin for WordPress is vulnerable to Arbitrary File Reading in all versions up to, and including, 2.1.1 via the hello_world_lyric() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Published: 2024-10-01
Score: 6.5 Medium
EPSS: 50.8% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
References

Mon, 07 Oct 2024 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Kau-boys
Kau-boys hello World
CPEs cpe:2.3:a:kau-boys:hello_world:*:*:*:*:*:wordpress:*:*
Vendors & Products Kau-boys
Kau-boys hello World

Tue, 01 Oct 2024 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Oct 2024 08:45:00 +0000

Type Values Removed Values Added
Description The Hello World plugin for WordPress is vulnerable to Arbitrary File Reading in all versions up to, and including, 2.1.1 via the hello_world_lyric() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Title Hello World <= 2.1.1 - Authenticated (Subscriber+) Arbitrary File Read
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Kau-boys Hello World
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:44:38.975Z

Reserved: 2024-09-26T17:46:36.496Z

Link: CVE-2024-9224

cve-icon Vulnrichment

Updated: 2024-10-01T13:53:28.184Z

cve-icon NVD

Status : Modified

Published: 2024-10-01T09:15:07.190

Modified: 2026-04-08T17:19:43.797

Link: CVE-2024-9224

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses