Vulnerable versions of the Jupiter (<= 6.10.1) and JupiterX (<= 2.0.6) Themes allow logged-in users, including subscriber-level users, to perform Path Traversal and Local File inclusion. In the JupiterX theme, the jupiterx_cp_load_pane_action AJAX action present in the lib/admin/control-panel/control-panel.php file calls the load_control_panel_pane function. It is possible to use this action to include any local PHP file via the slug parameter. The Jupiter theme has a nearly identical vulnerability which can be exploited via the mka_cp_load_pane_action AJAX action present in the framework/admin/control-panel/logic/functions.php file, which calls the mka_cp_load_pane_action function.
References
Link | Resource |
---|---|
https://www.wordfence.com/blog/2022/05/critical-privilege-escalation-vulnerability-in-jupiter-and-jupiterx-premium-themes/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-06-13 14:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-1657
Mitre link : CVE-2022-1657
CVE.ORG link : CVE-2022-1657
JSON object : View
Products Affected
artbees
- jupiterx
- jupiter
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')