Vulnerability Description
An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jsmol2Wp Project | Jsmol2Wp | 1.07 |
Related Weaknesses (CWE)
References
- https://wpvulndb.com/vulnerabilities/9197ExploitThird Party Advisory
- https://www.cbiu.cc/2018/12/WordPress%E6%8F%92%E4%BB%B6jsmol2wp%E6%BC%8F%E6%B4%9ExploitThird Party Advisory
- https://wpvulndb.com/vulnerabilities/9197ExploitThird Party Advisory
- https://www.cbiu.cc/2018/12/WordPress%E6%8F%92%E4%BB%B6jsmol2wp%E6%BC%8F%E6%B4%9ExploitThird Party Advisory
FAQ
What is CVE-2018-20463?
CVE-2018-20463 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query stri...
How severe is CVE-2018-20463?
CVE-2018-20463 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-20463?
Check the references section above for vendor advisories and patch information. Affected products include: Jsmol2Wp Project Jsmol2Wp.