Canto plugin vulnerable to Remote File Inclusion exploit
CVE-2024-4936

9.8CRITICAL

Key Information:

Vendor
Wordpress
Status
Vendor
CVE Published:
14 June 2024

Summary

The Canto plugin for WordPress contains a Remote File Inclusion vulnerability that affects all versions up to and including 3.0.8. This vulnerability arises from inadequate validation of the abspath parameter, enabling unauthenticated attackers to include and execute remote files on the server. The exploit requires that the allow_url_include setting be enabled on the target WordPress site, which could lead to severe security implications, including unauthorized command execution and server compromise.

Affected Version(s)

Canto * <= 3.0.8

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Sushi Com Abacate
.