vendor:
The True Ranker
by:
Nicole Sheinin, Liad Levy
8.8
CVSS
HIGH
Arbitrary File Read
22
CWE
Product Name: The True Ranker
Affected Version From: <= 2.2.2
Affected Version To: 2.2.2002
Patch Exists: YES
Related CWE: CVE-2021-39312
CPE: a:wordpress:wordpress:2.2.2
Tags: unauth,lfr,wpscan,cve,cve2021,wp-plugin,lfi,wp,wordpress
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Nuclei References:
https://wpscan.com/vulnerability/d48e723c-e3d1-411e-ab8e-629fe1606c79, https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39312, https://plugins.trac.wordpress.org/browser/seo-local-rank/tags/2.2.2/admin/vendor/datatables/examples/resources/examples.php, https://nvd.nist.gov/vuln/detail/CVE-2021-39312
Nuclei Metadata: {'max-request': 1, 'framework': 'wordpress', 'vendor': 'trueranker', 'product': 'true_ranker'}
Platforms Tested: MacOS
2021
WordPress Plugin The True Ranker 2.2.2 – Arbitrary File Read (Unauthenticated)
The True Ranker plugin for WordPress is vulnerable to an unauthenticated arbitrary file read vulnerability. An attacker can send a specially crafted request to the vulnerable endpoint and read arbitrary files from the server.
Mitigation:
Update to version 2.2.3 or later.