Lucene search

K
wpvulndbWpvulndbWPVDB-ID:5444BF99-236F-49BC-9DB3-BB81FF4F6949
HistoryFeb 01, 2024 - 12:00 a.m.

Popup More < 2.2.5 - Admin+ Directory Traversal to Limited Local File Inclusion

2024-02-0100:00:00
wpscan.com
4
popup more
admin+
directory traversal
local file inclusion

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.2%

Description The plugin is vulnerable to Local File Inclusion via the ycfChangeElementData() function. This makes it possible for authenticated attackers, with administrator-level access and above, to include and execute arbitrary files ending with “Form.php” on the server , allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

CPENameOperatorVersion
eq2.2.5

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.2%

Related for WPVDB-ID:5444BF99-236F-49BC-9DB3-BB81FF4F6949