NA

CVE-2024-0844

Published: 02/02/2024 Updated: 08/02/2024
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 0

Vulnerability Summary

The Popup More Popups, Lightboxes, and more popup modules plugin for WordPress is vulnerable to Local File Inclusion in version 2.1.6 via the ycfChangeElementData() function. This makes it possible for authenticated attackers, with administrator-level access and above, to include and execute arbitrary files ending with "Form.php" on the server , allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

Vulnerable Product Search on Vulmon Subscribe to Product

felixmoira popup more popups\\, lightboxes\\, and more popup modules

Github Repositories

CVE-2024-0844 - Popup More <= 2.2.4 - Authenticated (Admin+) Directory Traversal to Limited Local File Inclusion

Popup-more &lt; 220 CVE-2024-0844 Path traversal in the popup-more WordPress plugin Description Vulnerable file location : /popup-more/classes/Ajaxphp Link : wordpressorg/plugins/popup-more/#description Version : - &lt; 220 Parameter: formKey Status: unpatched githubcom/advisories/GHSA-wxfh-8hrr-vfjw Code snippet: require_once YPM_POPUP_CLA