The String locator WordPress plugin before 2.5.0 does not properly validate the path of the files to be searched, allowing high privilege users such as admin to query arbitrary files on the web server via a path traversal vector. Furthermore, due to a flaw in the search, allowing a pattern to be provided, which will be used to output the relevant matches from the matching file, all content of the file can be disclosed.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/2685592 | Release Notes Vendor Advisory |
https://wpscan.com/vulnerability/21e2e5fc-03d2-4791-beef-07af6bf985ed | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2022-03-28T17:22:54
Updated: 2022-03-28T17:22:53
Reserved: 2022-02-04T00:00:00
Link: CVE-2022-0493
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-03-28T18:15:08.953
Modified: 2022-04-04T20:26:44.430
Link: CVE-2022-0493
JSON object: View
Redhat Information
No data.
CWE