Description
One or more fully qualified path names were found. From this information the attacker may learn the file system structure from the web server. This information can be used to conduct further attacks.
Remediation
Prevent this information from being displayed to the user.
References
Related Vulnerabilities
WordPress Plugin Duplicator-WordPress Migration Arbitrary File Download (1.3.26)
WordPress Plugin ACF to REST API Information Disclosure (3.2.0)
Plone CMS Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2013-4194)
phpMyAdmin Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-5730)