Lucene search

K
wpvulndbWpvulndbWPVDB-ID:1D832899-68A2-4997-BA63-7D79986B7552
HistoryMay 18, 2022 - 12:00 a.m.

Jupiter < 6.10.2 & JupiterX < 2.0.7 - Subscriber+ Path Traversal and Local File Inclusion

2022-05-1800:00:00
wpscan.com
7

0.001 Low

EPSS

Percentile

27.9%

Any logged-in users, such as subscriber, can perform Path Traversal and Local File inclusion. In the JupiterX theme, the jupiterx_cp_load_pane_action AJAX action present in the lib/admin/control-panel/control-panel.php file calls the load_control_panel_pane function. It is possible to use this action to include any local PHP file via the slug parameter. The Jupiter theme has a nearly identical vulnerability which can be exploited via the mka_cp_load_pane_action AJAX action present in the framework/admin/control-panel/logic/functions.php file, which calls the mka_cp_load_pane_action function.

CPENameOperatorVersion
jupiterxlt2.0.7
jupiterlt6.10.2

0.001 Low

EPSS

Percentile

27.9%

Related for WPVDB-ID:1D832899-68A2-4997-BA63-7D79986B7552