Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-35fp-65cr-47q7

Опубликовано: 26 апр. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

The Admin Word Count Column WordPress plugin through 2.2 does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique

The Admin Word Count Column WordPress plugin through 2.2 does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique

EPSS

Процентиль: 100%
0.92036
Критический

9.8 Critical

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 9.8
nvd
почти 4 года назад

The Admin Word Count Column WordPress plugin through 2.2 does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique

EPSS

Процентиль: 100%
0.92036
Критический

9.8 Critical

CVSS3

Дефекты

CWE-22