Vulnerability Description
WordPress Plugin WP with Spritz 1.0 contains a remote file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by injecting file paths into the url parameter. Attackers can send GET requests to wp.spritz.content.filter.php with malicious url values to access sensitive files like system configuration and credentials.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://downloads.wordpress.org/plugin/wp-with-spritz.zip
- https://www.exploit-db.com/exploits/44544
- https://www.vulncheck.com/advisories/wordpress-plugin-wp-with-spritz-remote-file
FAQ
What is CVE-2018-25329?
CVE-2018-25329 is a vulnerability with a CVSS score of 7.5 (HIGH). WordPress Plugin WP with Spritz 1.0 contains a remote file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by injecting file paths into the url parameter. Attacke...
How severe is CVE-2018-25329?
CVE-2018-25329 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-25329?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.