The WordPress Infinite Scroll – Ajax Load More plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 5.5.3 via the 'type' parameter found in the alm_get_layout() function. This makes it possible for authenticated attackers, with administrative permissions, to read the contents of arbitrary files on the server, which can contain sensitive information.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://www.wordfence.com/threat-intel/vulnerabilities/id/8957413c-95e0-49c8-ba8a-02b9b5141e08?source=cve | |
https://plugins.svn.wordpress.org/ajax-load-more/tags/5.5.4/README.txt | third party advisory release notes |
https://gist.github.com/Xib3rR4dAr/f9a4b4838154854ec6cde7d5deb76bf9 | third party advisory exploit |
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2945 | third party advisory |