Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6554: CWE-200 Information Exposure in wpmudev Branda – White Label WordPress, Custom Login Page Customizer

0
Medium
VulnerabilityCVE-2024-6554cvecve-2024-6554cwe-200
Published: Thu Jul 11 2024 (07/11/2024, 03:33:18 UTC)
Source: CVE Database V5
Vendor/Project: wpmudev
Product: Branda – White Label WordPress, Custom Login Page Customizer

Description

CVE-2024-6554 is a medium severity information exposure vulnerability affecting all versions of the Branda – White Label WordPress, Custom Login Page Customizer plugin up to 3. 4. 18. The flaw arises from improper access controls on composer files, allowing unauthenticated attackers to retrieve the full filesystem path of the web application. While this full path disclosure does not directly compromise confidentiality, integrity, or availability, it can facilitate further targeted attacks if combined with other vulnerabilities. No user interaction or authentication is required to exploit this issue. There are currently no known exploits in the wild, and no official patches have been released yet. Organizations using this plugin should monitor for updates and consider restricting direct access to composer files as a mitigation. The vulnerability primarily impacts WordPress sites using this plugin, which are widespread globally, with particular risk in countries with high WordPress adoption. The severity is rated medium due to limited impact and ease of exploitation without authentication but low standalone damage potential.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:15:01 UTC

Technical Analysis

CVE-2024-6554 is an information exposure vulnerability classified under CWE-200 that affects the Branda – White Label WordPress, Custom Login Page Customizer plugin for WordPress. The vulnerability exists because the plugin uses composer dependencies without adequately restricting direct access to these files. This misconfiguration allows unauthenticated attackers to retrieve the full filesystem path of the web server hosting the WordPress site. The full path disclosure can reveal directory structures and installation paths, which are valuable reconnaissance information for attackers planning further exploitation, such as local file inclusion or remote code execution, if other vulnerabilities are present. The vulnerability affects all versions up to and including 3.4.18. Exploitation requires no authentication or user interaction and can be performed remotely over the network. The CVSS v3.1 base score is 5.3, reflecting a medium severity level due to the limited impact on confidentiality and no direct impact on integrity or availability. No known exploits have been reported in the wild, and no official patches have been published at the time of disclosure. The vulnerability's root cause is a failure to prevent direct HTTP access to composer files, which should be protected via web server configuration or plugin code changes. This issue highlights the importance of secure handling of third-party dependencies within WordPress plugins to prevent information leakage.

Potential Impact

The primary impact of CVE-2024-6554 is the disclosure of the full filesystem path of the WordPress installation to unauthenticated attackers. While this information alone does not compromise sensitive data or system integrity, it significantly aids attackers in crafting more effective attacks by revealing the directory structure and environment details. This can facilitate exploitation of other vulnerabilities such as local file inclusion, path traversal, or privilege escalation. For organizations, this means an increased risk profile if other security weaknesses exist in their WordPress environment. The vulnerability does not directly affect availability or integrity, and no user credentials or sensitive content are exposed by itself. However, the ease of exploitation without authentication and user interaction means that attackers can perform reconnaissance at scale, potentially targeting many sites running the vulnerable plugin. This can lead to targeted attacks on high-value WordPress sites, especially those with additional vulnerabilities or misconfigurations. The lack of known exploits in the wild currently limits immediate risk, but the exposure of this information can accelerate future attacks once combined with other flaws.

Mitigation Recommendations

Organizations should implement the following specific mitigations to reduce risk from CVE-2024-6554: 1) Immediately restrict direct HTTP access to composer files and directories used by the Branda plugin via web server configuration (e.g., .htaccess rules for Apache or location blocks for Nginx) to prevent unauthorized file retrieval. 2) Monitor official wpmudev communications and update the Branda plugin promptly once a security patch addressing this vulnerability is released. 3) Conduct a thorough security audit of the WordPress environment to identify and remediate any additional vulnerabilities that could be exploited in conjunction with this information disclosure. 4) Employ web application firewalls (WAFs) with rules to detect and block suspicious requests targeting composer files or unusual path disclosure attempts. 5) Limit plugin usage to trusted sources and minimize the number of installed plugins to reduce attack surface. 6) Harden WordPress installations by following best practices such as disabling directory listing, enforcing least privilege on file permissions, and regularly scanning for vulnerabilities. 7) Educate site administrators about the risks of information disclosure and the importance of timely patching and secure configuration.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-07-08T14:21:10.292Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c06b7ef31ef0b55f1ba

Added to database: 2/25/2026, 9:39:18 PM

Last enriched: 2/26/2026, 3:15:01 AM

Last updated: 2/26/2026, 8:08:58 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats