Description
One or more fully qualified path names were found. From this information the attacker may learn the file system structure from the web server. This information can be used to conduct further attacks.
This alert may be a false positive, manual confirmation is required.
Remediation
Prevent this information from being displayed to the user.
References
Related Vulnerabilities
WordPress Plugin Wholesale Market for WooCommerce Arbitrary File Download (1.0.7)
Joomla! Core 1.5.x Information Disclosure (1.5.0 - 1.5.14)
WordPress 4.7.x Multiple Vulnerabilities (4.7 - 4.7.26)
WordPress Plugin Video Conferencing with Zoom Information Disclosure (3.8.16)
WordPress Plugin ACF to REST API Information Disclosure (3.2.0)