WordPress Plugin Vulnerabilities
Custom Content Shortcode < 4.0.2 - Authenticated Arbitrary File Access / LFI
Description
The plugin does not validate the data passed to its load shortcode, which could allow Contributor+ (v < 4.0.1) or Admin+ (v < 4.0.2) users to display arbitrary files from the filesystem (such as logs, .htaccess etc), as well as perform Local File Inclusion attacks as PHP files will be executed. Please note that such attack is still possible by admin+ in single site blogs by default (but won't be when either the unfiltered_html or file_edit is disallowed)
Proof of Concept
If the file is a PHP one, its content will be executed, leading to a LFI [load dir=site file=a.php] Otherwise, if can be used to access sensitive data by displaying them (such as via log files for example) [load dir=site file=.htaccess]
Affects Plugins
References
CVE
Classification
Type
ACCESS CONTROLS
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Francesco Carlucci
Submitter
Francesco Carlucci
Submitter website
Submitter twitter
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2022-02-02 (about 2 years ago)
Added
2022-02-02 (about 2 years ago)
Last Updated
2022-04-09 (about 2 years ago)