CVE-2024-6573
📋 TL;DR
The Intelligence WordPress plugin up to version 1.4.0 allows unauthenticated attackers to retrieve the full server path via direct access to a PHP file with display_errors enabled. This information disclosure vulnerability doesn't cause direct damage but can aid attackers in exploiting other vulnerabilities. All WordPress sites using affected plugin versions are vulnerable.
💻 Affected Systems
- WordPress Intelligence Plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers combine path disclosure with another vulnerability (like file inclusion or directory traversal) to achieve remote code execution or sensitive data exposure.
Likely Case
Attackers gather reconnaissance information about server structure to plan more sophisticated attacks against the WordPress installation.
If Mitigated
Minimal impact - attackers only obtain path information that doesn't directly compromise the system.
🎯 Exploit Status
Simple HTTP request to vulnerable endpoint reveals full path in error messages.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 1.4.0
Vendor Advisory: https://plugins.trac.wordpress.org/browser/intelligence/trunk/
Restart Required: No
Instructions:
1. Update Intelligence plugin to latest version via WordPress admin panel. 2. Alternatively, remove the plugin if not needed. 3. Verify update by checking plugin version in WordPress admin.
🔧 Temporary Workarounds
Block direct access to vulnerable file
allAdd .htaccess rule to block access to the vulnerable PHP file
# Add to .htaccess in WordPress root:
<Files "vendor/levelten/intel/realtime/index.php">
Order Allow,Deny
Deny from all
</Files>
Disable PHP display_errors
allSet display_errors = Off in php.ini configuration
# In php.ini:
display_errors = Off
# Alternative in .htaccess:
php_flag display_errors off
🧯 If You Can't Patch
- Remove or disable the Intelligence plugin entirely
- Implement web application firewall rules to block requests to /vendor/levelten/intel/realtime/index.php
🔍 How to Verify
Check if Vulnerable:
Access https://[your-site]/wp-content/plugins/intelligence/vendor/levelten/intel/realtime/index.php - if it returns a PHP error showing full server path, you're vulnerable.
Check Version:
Check WordPress admin panel > Plugins > Intelligence, or examine wp-content/plugins/intelligence/readme.txt file version
Verify Fix Applied:
After update, access the same URL - should return 403/404 or generic error without path disclosure.
📡 Detection & Monitoring
Log Indicators:
- HTTP 200/500 responses to /wp-content/plugins/intelligence/vendor/levelten/intel/realtime/index.php
- PHP error logs containing full path disclosures
Network Indicators:
- GET requests to vulnerable endpoint from unauthenticated sources
SIEM Query:
web.url:*intelligence/vendor/levelten/intel/realtime/index.php AND (http.status_code:200 OR http.status_code:500)
🔗 References
- https://plugins.trac.wordpress.org/browser/intelligence/trunk/vendor/levelten/intel/realtime/index.php
- https://plugins.trac.wordpress.org/browser/intelligence/trunk/vendor/levelten/intel/realtime/settings.php#L12
- https://www.wordfence.com/threat-intel/vulnerabilities/id/b5aa0222-1e70-4c06-860f-77643da4356c?source=cve
- https://plugins.trac.wordpress.org/browser/intelligence/trunk/vendor/levelten/intel/realtime/index.php
- https://plugins.trac.wordpress.org/browser/intelligence/trunk/vendor/levelten/intel/realtime/settings.php#L12
- https://www.wordfence.com/threat-intel/vulnerabilities/id/b5aa0222-1e70-4c06-860f-77643da4356c?source=cve