Description
Simple Fields 0.2 through 0.3.5 WordPress Plugin contains a local file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by injecting null bytes into the wp_abspath parameter on PHP versions before 5.3.4. Attackers can supply malicious wp_abspath values to simple_fields.php to include files like /etc/passwd or inject PHP code into Apache logs for remote code execution when allow_url_include is enabled.
Published: 2026-05-17
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Simple Fields WordPress plugin versions 0.2 through 0.3.5 contains a local file inclusion flaw that allows an attacker to supply specially crafted wp_abspath values with null bytes to read arbitrary files. Because the plugin naively passes the parameter to the include() function, a malicious user can read sensitive files such as /etc/passwd and, if the server permits URL inclusion, inject PHP code into web‑server logs for remote code execution. The vulnerability is categorized as CWE‑98 and could compromise confidentiality, integrity, and availability of the affected system.

Affected Systems

WordPress sites that have the Simple Fields plugin installed in any of the vulnerable releases (0.2 to 0.3.5) and are running a PHP interpreter older than version 5.3.4 are directly impacted. Sites using later PHP versions are not susceptible to the null‑byte bypass, but the plugin remains vulnerable to the basic LFI if allow_url_include is enabled. Administrators should verify the current plugin version and PHP runtime before assessing risk.

Risk and Exploitability

This flaw carries a CVSS score of 6.9, indicating a moderate to high severity risk. The EPSS score is not available, and the vulnerability is not in the CISA KEV catalogue, implying a lower observed exploitation rate. The lack of authentication requirements means any visitor can trouble the system, and the possibility to execute PHP code through log injection makes the threat particularly dangerous in misconfigured hosts. Despite the absence of quantitative exploit data, the potential for arbitrary code execution warrants prompt attention.

Generated by OpenCVE AI on May 17, 2026 at 13:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade or replace the Simple Fields plugin with the latest patched version or remove the plugin if it is no longer needed.
  • Upgrade the PHP runtime to version 5.3.4 or higher and disable the allow_url_include setting to eliminate code injection via log files.
  • Implement input validation or sanitization for the wp_abspath parameter in the plugin, or patch the code to use safe inclusion mechanisms such as realpath checks and constant path definitions.

Generated by OpenCVE AI on May 17, 2026 at 13:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 17 May 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Simple Fields Project
Simple Fields Project simple Fields
Wordpress
Wordpress wordpress
Vendors & Products Simple Fields Project
Simple Fields Project simple Fields
Wordpress
Wordpress wordpress

Sun, 17 May 2026 12:30:00 +0000

Type Values Removed Values Added
Description Simple Fields 0.2 through 0.3.5 WordPress Plugin contains a local file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by injecting null bytes into the wp_abspath parameter on PHP versions before 5.3.4. Attackers can supply malicious wp_abspath values to simple_fields.php to include files like /etc/passwd or inject PHP code into Apache logs for remote code execution when allow_url_include is enabled.
Title Simple Fields 0.2-0.3.5 Local File Inclusion via wp_abspath
Weaknesses CWE-98
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Simple Fields Project Simple Fields
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-17T12:11:30.562Z

Reserved: 2026-05-17T11:38:21.675Z

Link: CVE-2018-25324

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-17T13:16:43.787

Modified: 2026-05-17T13:16:43.787

Link: CVE-2018-25324

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-17T16:45:05Z

Weaknesses