Description
One or more fully qualified path names were been found. From this information the attacker may learn the file system structure from the web server. This information can be used to conduct further attacks.
Remediation
Prevent this information from being displayed to the user.
References
Related Vulnerabilities
Drupal Core 9.0.x Information Disclosure (9.0.0 - 9.0.5)
WordPress Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2011-3128)
PHP Safedir restriction bypass vulnerabilities
WordPress Plugin ACF to REST API Information Disclosure (3.2.0)
WordPress Plugin Jetpack-WP Security, Backup, Speed, & Growth Information Disclosure (9.7.1)