CVE-2024-12535: CWE-862 Missing Authorization in eflyjason Host PHP Info
CVE-2024-12535 is a high-severity vulnerability in the eflyjason Host PHP Info WordPress plugin that allows unauthenticated attackers to access sensitive server configuration data. The flaw arises from a missing authorization check when the plugin exposes the phpinfo function, enabling attackers to read detailed PHP environment settings without any authentication or user interaction. This vulnerability affects all versions up to and including 1. 0. 4 and can be exploited even if the plugin is not activated. The exposure of configuration details can aid attackers in crafting further attacks against the server or application. Although no known exploits are currently reported in the wild, the vulnerability's ease of exploitation and high impact on confidentiality make it a critical risk for affected sites. Organizations using this plugin should prioritize mitigation to prevent unauthorized data disclosure.
AI Analysis
Technical Summary
CVE-2024-12535 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Host PHP Info plugin developed by eflyjason for WordPress. The vulnerability exists because the plugin fails to perform proper capability checks before including the phpinfo function output. Phpinfo reveals extensive details about the server's PHP configuration, environment variables, loaded modules, and other sensitive information. Since the plugin does not require activation for the vulnerability to be exploited, any WordPress site with the plugin installed is at risk. The vulnerability has a CVSS 3.1 base score of 8.6, indicating high severity, with an attack vector of network (remote), no privileges required, no user interaction, and a scope change due to confidentiality impact. The vulnerability allows unauthenticated remote attackers to retrieve sensitive configuration data, which can be leveraged for further attacks such as privilege escalation, code injection, or targeted exploitation of other vulnerabilities. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved on December 11, 2024, and published on January 7, 2025.
Potential Impact
The primary impact of CVE-2024-12535 is the unauthorized disclosure of sensitive server configuration information, which compromises confidentiality. Attackers can gain insights into PHP version details, loaded extensions, server environment variables, and other configuration parameters that can facilitate further exploitation, such as identifying vulnerable components or misconfigurations. Although the vulnerability does not directly affect integrity or availability, the information disclosure can lead to more severe attacks, including remote code execution or privilege escalation. Organizations running WordPress sites with the vulnerable plugin are at risk of data leakage, potentially exposing internal infrastructure details to attackers. This can be particularly damaging for high-profile websites, e-commerce platforms, or sites handling sensitive user data. The fact that exploitation requires no authentication and no user interaction increases the risk and potential attack surface significantly.
Mitigation Recommendations
To mitigate CVE-2024-12535, organizations should immediately identify and remove or disable the eflyjason Host PHP Info plugin from their WordPress installations if it is not essential. If the plugin is required, monitor the vendor's official channels for patches or updates addressing the missing authorization check and apply them promptly once available. As a temporary measure, restrict access to the phpinfo endpoint or the plugin's files via web server configuration (e.g., using .htaccess rules or firewall rules) to allow only trusted IP addresses or authenticated users. Additionally, implement web application firewalls (WAFs) with custom rules to detect and block requests attempting to access the phpinfo functionality. Regularly audit WordPress plugins for unnecessary or outdated components and enforce the principle of least privilege for plugin capabilities. Finally, maintain comprehensive logging and monitoring to detect any suspicious access patterns related to this vulnerability.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2024-12535: CWE-862 Missing Authorization in eflyjason Host PHP Info
Description
CVE-2024-12535 is a high-severity vulnerability in the eflyjason Host PHP Info WordPress plugin that allows unauthenticated attackers to access sensitive server configuration data. The flaw arises from a missing authorization check when the plugin exposes the phpinfo function, enabling attackers to read detailed PHP environment settings without any authentication or user interaction. This vulnerability affects all versions up to and including 1. 0. 4 and can be exploited even if the plugin is not activated. The exposure of configuration details can aid attackers in crafting further attacks against the server or application. Although no known exploits are currently reported in the wild, the vulnerability's ease of exploitation and high impact on confidentiality make it a critical risk for affected sites. Organizations using this plugin should prioritize mitigation to prevent unauthorized data disclosure.
AI-Powered Analysis
Technical Analysis
CVE-2024-12535 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Host PHP Info plugin developed by eflyjason for WordPress. The vulnerability exists because the plugin fails to perform proper capability checks before including the phpinfo function output. Phpinfo reveals extensive details about the server's PHP configuration, environment variables, loaded modules, and other sensitive information. Since the plugin does not require activation for the vulnerability to be exploited, any WordPress site with the plugin installed is at risk. The vulnerability has a CVSS 3.1 base score of 8.6, indicating high severity, with an attack vector of network (remote), no privileges required, no user interaction, and a scope change due to confidentiality impact. The vulnerability allows unauthenticated remote attackers to retrieve sensitive configuration data, which can be leveraged for further attacks such as privilege escalation, code injection, or targeted exploitation of other vulnerabilities. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved on December 11, 2024, and published on January 7, 2025.
Potential Impact
The primary impact of CVE-2024-12535 is the unauthorized disclosure of sensitive server configuration information, which compromises confidentiality. Attackers can gain insights into PHP version details, loaded extensions, server environment variables, and other configuration parameters that can facilitate further exploitation, such as identifying vulnerable components or misconfigurations. Although the vulnerability does not directly affect integrity or availability, the information disclosure can lead to more severe attacks, including remote code execution or privilege escalation. Organizations running WordPress sites with the vulnerable plugin are at risk of data leakage, potentially exposing internal infrastructure details to attackers. This can be particularly damaging for high-profile websites, e-commerce platforms, or sites handling sensitive user data. The fact that exploitation requires no authentication and no user interaction increases the risk and potential attack surface significantly.
Mitigation Recommendations
To mitigate CVE-2024-12535, organizations should immediately identify and remove or disable the eflyjason Host PHP Info plugin from their WordPress installations if it is not essential. If the plugin is required, monitor the vendor's official channels for patches or updates addressing the missing authorization check and apply them promptly once available. As a temporary measure, restrict access to the phpinfo endpoint or the plugin's files via web server configuration (e.g., using .htaccess rules or firewall rules) to allow only trusted IP addresses or authenticated users. Additionally, implement web application firewalls (WAFs) with custom rules to detect and block requests attempting to access the phpinfo functionality. Regularly audit WordPress plugins for unnecessary or outdated components and enforce the principle of least privilege for plugin capabilities. Finally, maintain comprehensive logging and monitoring to detect any suspicious access patterns related to this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-11T18:10:39.662Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e41b7ef31ef0b59bbd7
Added to database: 2/25/2026, 9:48:49 PM
Last enriched: 2/26/2026, 3:27:43 AM
Last updated: 2/26/2026, 8:47:25 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.