Description
One or more fully qualified path names were been found. From this information the attacker may learn the file system structure from the web server. This information can be used to conduct further attacks.
Remediation
Prevent this information from being displayed to the user.
References
Related Vulnerabilities
WordPress Plugin Slack-Chat Information Disclosure (1.5.5)
WordPress Plugin Aspose Cloud eBook Generator Arbitrary File Download (1.0)
WordPress Plugin Gallery-Flagallery Photo Portfolio Information Disclosure (4.24)
WordPress Plugin AccessAlly Information Disclosure (3.5.6)
WordPress Plugin Debug Log Manager Information Disclosure (2.2.2)