Products
WordPress Canto plugin
- up to 3.0.8
Source
security@wordfence.com
Tags
CVE-2024-4936 details
Published : June 14, 2024, 5:15 a.m.
Last Modified : June 14, 2024, 5:15 a.m.
Last Modified : June 14, 2024, 5:15 a.m.
Description
The Canto plugin for WordPress is vulnerable to Remote File Inclusion in all versions up to, and including, 3.0.8 via the abspath parameter. This makes it possible for unauthenticated attackers to include remote files on the server, resulting in code execution. This required allow_url_include to be enabled on the target site in order to exploit.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9.8 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
9.8
Exploitability Score
Impact Score
Base Severity
CRITICAL
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References
URL | Source |
---|---|
https://plugins.trac.wordpress.org/browser/canto/trunk/includes/lib/sizes.php#L15 | security@wordfence.com |
https://www.wordfence.com/threat-intel/vulnerabilities/id/95a68ae0-36da-499b-a09d-4c91db8aa338?source=cve | security@wordfence.com |
This website uses the NVD API, but is not approved or certified by it.