vendor:
Wpeasystats
by:
Ben Schmidt
8.8
CVSS
HIGH
Remote File Inclusion (RFI)
98
CWE
Product Name: Wpeasystats
Affected Version From: 1.8
Affected Version To: 1.8
Patch Exists: YES
Related CWE: N/A
CPE: a:wordpress:wpeasystats
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011
Wpeasystats WordPress plugin RFI
The Wpeasystats Wordpress plugin is vulnerable to a Remote File Inclusion (RFI) attack. An attacker can send a malicious URL to an unsuspecting user, which when clicked, will execute arbitrary code on the vulnerable server. This is possible due to the lack of input validation in the export.php file, which allows an attacker to include a remote file via the 'homep' parameter.
Mitigation:
Input validation should be implemented to prevent malicious code from being executed.