The WordPress Infinite Scroll – Ajax Load More plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 5.5.3 via the 'type' parameter found in the alm_get_layout() function. This makes it possible for authenticated attackers, with administrative permissions, to read the contents of arbitrary files on the server, which can contain sensitive information.
References
Link | Resource |
---|---|
https://gist.github.com/Xib3rR4dAr/f9a4b4838154854ec6cde7d5deb76bf9 | Exploit Third Party Advisory |
https://plugins.svn.wordpress.org/ajax-load-more/tags/5.5.4/README.txt | Release Notes Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/8957413c-95e0-49c8-ba8a-02b9b5141e08?source=cve | |
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2945 | Third Party Advisory |
Configurations
History
11 Jan 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2022-09-06 18:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-2945
Mitre link : CVE-2022-2945
CVE.ORG link : CVE-2022-2945
JSON object : View
Products Affected
connekthq
- ajax_load_more
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')