WordPress Plugin Vulnerabilities

Theme Editor < 2.6 - Authenticated Arbitrary File Download

Description

The plugin did not validate the GET file parameter before passing it to the download_file() function, allowing administrators to download arbitrary files on the web server, such as /etc/passwd

Edit (WPScanTeam): The AJAX action wp_ajax_mk_theme_editor_file_open could also be used to achieve the same thing and was reported & fixed as well.

Proof of Concept

Affects Plugins

Fixed in 2.6

References

Classification

Type
FILE DOWNLOAD
OWASP top 10
CWE

Miscellaneous

Original Researcher
Nguyen Van Khanh - SunCSR (Sun* Cyber Security Research)
Submitter
khanh
Verified
Yes

Timeline

Publicly Published
2021-02-13 (about 4 years ago)
Added
2021-02-13 (about 4 years ago)
Last Updated
2021-02-14 (about 4 years ago)

Other