Remote File Inclusion Vulnerability in Canto Plugin for WordPress
CVE-2023-3452
Key Information:
Badges
Summary
The Canto plugin for WordPress contains a Remote File Inclusion vulnerability that affects versions up to 3.0.4. This vulnerability arises from improper handling of the 'wp_abspath' parameter, which potentially allows unauthenticated attackers to execute arbitrary remote code when the server's allow_url_include directive is enabled. While local file inclusion could also be exploited, it presents a lower risk as it requires the attacker to upload a malicious PHP file via FTP or another method, placing it in a directory accessible by the web server.
Affected Version(s)
Canto * <= 3.0.4
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved