WordPress Plugin Sniplets 1.1.2 Multiple Vulnerabilities
Wordpress Plugin Sniplets 1.1.2 is vulnerable to Remote File Inclusion, Cross-Site Scripting and Remote Code Execution. The Remote File Inclusion vulnerability is due to the lack of proper sanitization of user-supplied input in the 'libpath' parameter of the '/modules/syntax_highlight.php' script. This can be exploited to include arbitrary files from remote locations by using a URL in the 'libpath' parameter. The Cross-Site Scripting vulnerability is due to the lack of proper sanitization of user-supplied input in the 'text' parameter of the '/view/sniplets/warning.php', '/view/sniplets/notice.php', '/view/sniplets/inset.php' and '/view/admin/submenu.php' scripts. The Remote Code Execution vulnerability is due to the lack of proper sanitization of user-supplied input in the 'text' parameter of the '/modules/execute.php' script. This can be exploited to execute arbitrary PHP code.