The Category Ajax Filter plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.8.2 via the 'params[caf-post-layout]' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where files with a .php extension can be uploaded and included.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Trustyplugins
Trustyplugins category Ajax Filter |
|
CPEs | cpe:2.3:a:trustyplugins:category_ajax_filter:*:*:*:*:*:*:*:* | |
Vendors & Products |
Trustyplugins
Trustyplugins category Ajax Filter |
|
Metrics |
ssvc
|
Sat, 09 Nov 2024 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Category Ajax Filter plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.8.2 via the 'params[caf-post-layout]' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where files with a .php extension can be uploaded and included. | |
Title | Category Ajax Filter <= 2.8.2 - Unauthenticated Local File Inclusion | |
Weaknesses | CWE-98 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-11-09T07:35:03.165Z
Updated: 2024-11-12T18:39:57.920Z
Reserved: 2024-11-05T15:18:14.793Z
Link: CVE-2024-10871
Vulnrichment
Updated: 2024-11-12T18:39:50.132Z
NVD
Status : Awaiting Analysis
Published: 2024-11-09T08:15:04.530
Modified: 2024-11-12T13:56:24.513
Link: CVE-2024-10871
Redhat
No data.