Description
An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF.
Published: 2018-12-25
Score: 7.5 High
EPSS: 75.8% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Jsmol2wp Project Jsmol2wp
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T12:05:16.184Z

Reserved: 2018-12-25T00:00:00.000Z

Link: CVE-2018-20463

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-12-25T21:29:00.293

Modified: 2024-11-21T04:01:32.310

Link: CVE-2018-20463

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses