CVE-2024-7410: CWE-200 Information Exposure in esthertyler My Custom CSS PHP & ADS
CVE-2024-7410 is a medium severity vulnerability in the esthertyler My Custom CSS PHP & ADS WordPress plugin, affecting all versions up to 3. 3. It allows unauthenticated attackers to access the /my-custom-css/vendor/mobiledetect/mobiledetectlib/export/exportToJSON. php file directly, which discloses the full filesystem path of the web application. While this information disclosure does not directly compromise confidentiality, integrity, or availability, it can aid attackers in crafting further exploits if other vulnerabilities exist. No user interaction or authentication is required to exploit this issue. There are currently no known active exploits in the wild, and no official patches have been published yet. Organizations using this plugin should restrict direct access to sensitive files and monitor for suspicious activity. The vulnerability primarily impacts WordPress sites using this plugin, with higher risk in countries where WordPress market share and plugin usage are significant.
AI Analysis
Technical Summary
CVE-2024-7410 is an information exposure vulnerability classified under CWE-200, found in the esthertyler My Custom CSS PHP & ADS plugin for WordPress. The vulnerability arises because the plugin fails to restrict direct access to the file /my-custom-css/vendor/mobiledetect/mobiledetectlib/export/exportToJSON.php. When accessed, this PHP file reveals the full filesystem path of the web server hosting the WordPress site. This disclosure occurs without requiring any authentication or user interaction, making it trivially exploitable remotely. The full path disclosure can provide attackers with valuable information about the server environment, directory structure, and installation paths, which can be leveraged to facilitate more targeted attacks such as local file inclusion, remote code execution, or privilege escalation if other vulnerabilities are present. However, the disclosed information alone does not allow direct compromise of the system. The vulnerability affects all versions of the plugin up to and including version 3.3. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the low impact on confidentiality and no impact on integrity or availability. No patches or fixes have been officially released at the time of publication, and no known exploits have been observed in the wild. The vulnerability was publicly disclosed on August 9, 2024.
Potential Impact
The primary impact of this vulnerability is the exposure of sensitive server information, specifically the full filesystem path of the WordPress installation. While this does not directly compromise data confidentiality, integrity, or availability, it lowers the attacker's barrier to launching more severe attacks by providing critical environmental details. Attackers can use this information to fine-tune exploits targeting other vulnerabilities such as file inclusion, directory traversal, or code injection. For organizations, this means an increased risk of chained attacks that could lead to data breaches, website defacement, or service disruption if other weaknesses exist. The vulnerability affects all websites using the vulnerable plugin version, potentially exposing thousands of WordPress sites worldwide. However, the lack of direct exploitability and the absence of known active exploits reduce the immediate risk. Nonetheless, organizations should treat this as a moderate threat that could facilitate more damaging attacks if combined with other vulnerabilities.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement the following specific measures: 1) Immediately restrict direct access to the vulnerable PHP file (/my-custom-css/vendor/mobiledetect/mobiledetectlib/export/exportToJSON.php) by configuring web server rules (e.g., .htaccess for Apache or location blocks for Nginx) to deny all external requests to this path. 2) If possible, remove or disable the vulnerable plugin until a patch is released. 3) Monitor web server logs for any attempts to access the vulnerable file or other suspicious activity indicating reconnaissance. 4) Employ a Web Application Firewall (WAF) with custom rules to block requests targeting this file or similar sensitive plugin paths. 5) Keep WordPress core, themes, and plugins updated regularly and subscribe to security advisories for timely patching. 6) Conduct a thorough security audit to identify and remediate other vulnerabilities that could be chained with this information disclosure. 7) Limit file and directory permissions on the server to the minimum necessary to reduce information leakage. These targeted actions go beyond generic advice and directly address the exposure vector.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2024-7410: CWE-200 Information Exposure in esthertyler My Custom CSS PHP & ADS
Description
CVE-2024-7410 is a medium severity vulnerability in the esthertyler My Custom CSS PHP & ADS WordPress plugin, affecting all versions up to 3. 3. It allows unauthenticated attackers to access the /my-custom-css/vendor/mobiledetect/mobiledetectlib/export/exportToJSON. php file directly, which discloses the full filesystem path of the web application. While this information disclosure does not directly compromise confidentiality, integrity, or availability, it can aid attackers in crafting further exploits if other vulnerabilities exist. No user interaction or authentication is required to exploit this issue. There are currently no known active exploits in the wild, and no official patches have been published yet. Organizations using this plugin should restrict direct access to sensitive files and monitor for suspicious activity. The vulnerability primarily impacts WordPress sites using this plugin, with higher risk in countries where WordPress market share and plugin usage are significant.
AI-Powered Analysis
Technical Analysis
CVE-2024-7410 is an information exposure vulnerability classified under CWE-200, found in the esthertyler My Custom CSS PHP & ADS plugin for WordPress. The vulnerability arises because the plugin fails to restrict direct access to the file /my-custom-css/vendor/mobiledetect/mobiledetectlib/export/exportToJSON.php. When accessed, this PHP file reveals the full filesystem path of the web server hosting the WordPress site. This disclosure occurs without requiring any authentication or user interaction, making it trivially exploitable remotely. The full path disclosure can provide attackers with valuable information about the server environment, directory structure, and installation paths, which can be leveraged to facilitate more targeted attacks such as local file inclusion, remote code execution, or privilege escalation if other vulnerabilities are present. However, the disclosed information alone does not allow direct compromise of the system. The vulnerability affects all versions of the plugin up to and including version 3.3. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the low impact on confidentiality and no impact on integrity or availability. No patches or fixes have been officially released at the time of publication, and no known exploits have been observed in the wild. The vulnerability was publicly disclosed on August 9, 2024.
Potential Impact
The primary impact of this vulnerability is the exposure of sensitive server information, specifically the full filesystem path of the WordPress installation. While this does not directly compromise data confidentiality, integrity, or availability, it lowers the attacker's barrier to launching more severe attacks by providing critical environmental details. Attackers can use this information to fine-tune exploits targeting other vulnerabilities such as file inclusion, directory traversal, or code injection. For organizations, this means an increased risk of chained attacks that could lead to data breaches, website defacement, or service disruption if other weaknesses exist. The vulnerability affects all websites using the vulnerable plugin version, potentially exposing thousands of WordPress sites worldwide. However, the lack of direct exploitability and the absence of known active exploits reduce the immediate risk. Nonetheless, organizations should treat this as a moderate threat that could facilitate more damaging attacks if combined with other vulnerabilities.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement the following specific measures: 1) Immediately restrict direct access to the vulnerable PHP file (/my-custom-css/vendor/mobiledetect/mobiledetectlib/export/exportToJSON.php) by configuring web server rules (e.g., .htaccess for Apache or location blocks for Nginx) to deny all external requests to this path. 2) If possible, remove or disable the vulnerable plugin until a patch is released. 3) Monitor web server logs for any attempts to access the vulnerable file or other suspicious activity indicating reconnaissance. 4) Employ a Web Application Firewall (WAF) with custom rules to block requests targeting this file or similar sensitive plugin paths. 5) Keep WordPress core, themes, and plugins updated regularly and subscribe to security advisories for timely patching. 6) Conduct a thorough security audit to identify and remediate other vulnerabilities that could be chained with this information disclosure. 7) Limit file and directory permissions on the server to the minimum necessary to reduce information leakage. These targeted actions go beyond generic advice and directly address the exposure vector.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-08-02T12:27:06.012Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c16b7ef31ef0b55fc53
Added to database: 2/25/2026, 9:39:34 PM
Last enriched: 2/26/2026, 3:38:13 AM
Last updated: 2/26/2026, 6:17:00 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.