Arbitrary File Inclusion Vulnerability in Clean Login Plugin for WordPress
CVE-2024-8252

8.8HIGH

Key Information:

Vendor

Wordpress

Vendor
CVE Published:
30 August 2024

What is CVE-2024-8252?

The Clean Login plugin for WordPress presents a vulnerability that enables Local File Inclusion through the 'template' attribute in the clean-login-register shortcode. Authenticated users with Contributor-level access and above can exploit this flaw to include and execute arbitrary files on the server. This vulnerability can facilitate the execution of unauthorized PHP code, leading to access control bypassing, data exposure, or arbitrary code execution through the upload of seemingly safe file types such as images.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Clean Login * <= 1.14.5

References

EPSS Score

10% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

wesley
.