WordPress Plugin Vulnerabilities
Theme Editor < 2.6 - Authenticated Arbitrary File Download
Description
The plugin did not validate the GET file parameter before passing it to the download_file() function, allowing administrators to download arbitrary files on the web server, such as /etc/passwd
Edit (WPScanTeam): The AJAX action wp_ajax_mk_theme_editor_file_open could also be used to achieve the same thing and was reported & fixed as well.
Proof of Concept
Affects Plugins
References
CVE
Classification
Type
FILE DOWNLOAD
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Nguyen Van Khanh - SunCSR (Sun* Cyber Security Research)
Submitter
khanh
Submitter website
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-02-13 (about 4 years ago)
Added
2021-02-13 (about 4 years ago)
Last Updated
2021-02-14 (about 4 years ago)