The Popup Builder WordPress plugin before 4.0.7 does not validate and sanitise the sgpb_type parameter before using it in a require statement, leading to a Local File Inclusion issue. Furthermore, since the beginning of the string can be controlled, the issue can lead to RCE vulnerability via wrappers such as PHAR
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/2659117 | Release Notes Third Party Advisory |
https://wpscan.com/vulnerability/0f90f10c-4b0a-46da-ac1f-aa6a03312132 | Exploit Third Party Advisory |
https://plugins.trac.wordpress.org/changeset/2659117 | Release Notes Third Party Advisory |
https://wpscan.com/vulnerability/0f90f10c-4b0a-46da-ac1f-aa6a03312132 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/changeset/2659117 - Release Notes, Third Party Advisory | |
References | () https://wpscan.com/vulnerability/0f90f10c-4b0a-46da-ac1f-aa6a03312132 - Exploit, Third Party Advisory |
Information
Published : 2022-02-21 11:15
Updated : 2024-11-21 05:54
NVD link : CVE-2021-25082
Mitre link : CVE-2021-25082
CVE.ORG link : CVE-2021-25082
JSON object : View
Products Affected
sygnoos
- popup_builder
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')