The Canto plugin for WordPress is vulnerable to Remote File Inclusion in versions up to, and including, 3.0.4 via the 'wp_abspath' parameter. This allows unauthenticated attackers to include and execute arbitrary remote code on the server, provided that allow_url_include is enabled. Local File Inclusion is also possible, albeit less useful because it requires that the attacker be able to upload a malicious php file via FTP or some other means into a directory readable by the web server.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 11 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-10-11T16:54:05.577Z
Reserved: 2023-06-28T19:14:28.550Z
Link: CVE-2023-3452
Updated: 2024-08-02T06:55:03.333Z
Status : Modified
Published: 2023-08-12T03:15:09.330
Modified: 2024-11-21T08:17:17.887
Link: CVE-2023-3452
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.