CVE-2024-12542
linkID <= 0.1.2 - Missing Authorization to Unauthenticated Sensitive Information Exposure
CVSS Score
8.6
EPSS Score
0.0%
EPSS Percentile
0th
The linkID plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when including the 'phpinfo' function in all versions up to, and including, 0.1.2. This makes it possible for unauthenticated attackers to read configuration settings and predefined variables on the site's server. The plugin does not need to be activated for the vulnerability to be exploited.
| CWE | CWE-862 |
| Vendor | linkid |
| Product | linkid |
| Published | Jan 9, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for linkid linkid
Be the first to know when new high vulnerabilities affecting linkid linkid are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
linkid / linkID
0 โค 0.1.2
References
Credits
Francesco Carlucci