The Modal Window WordPress plugin before 5.2.2 within the wow-company admin menu page allows to include() arbitrary file with PHP extension (as well as with data:// or http:// protocols), thus leading to CSRF RCE.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://wpscan.com/vulnerability/566ff8dc-f820-412b-b2d3-fa789bce528e | third party advisory exploit |
https://plugins.trac.wordpress.org/changeset/2641645/modal-window | third party advisory patch |