Vulnerability in WP Blog Post Layouts Plugin Allows Arbitrary File Execution
CVE-2024-5503
8.8HIGH
Summary
The WP Blog Post Layouts plugin for WordPress contains a Local File Inclusion vulnerability that affects all versions up to and including 1.1.3. Authenticated users with Contributor-level access or higher can exploit this vulnerability to include and execute arbitrary PHP files located on the server. This not only allows attackers to bypass access controls but also poses a significant risk by enabling access to sensitive data and potential code execution, especially when images and other seemingly 'safe' file types are involved in the upload and inclusion process.
Affected Version(s)
WP Blog Post Layouts * <= 1.1.3
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Matthew Rollings