Description
WordPress Plugin WP with Spritz 1.0 contains a remote file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by injecting file paths into the url parameter. Attackers can send GET requests to wp.spritz.content.filter.php with malicious url values to access sensitive files like system configuration and credentials.
Problem types
Product status
Credits
Wadeek
References
www.exploit-db.com/exploits/44544 (ExploitDB-44544)
downloads.wordpress.org/plugin/wp-with-spritz.zip (Product Reference)
www.vulncheck.com/...in-wp-with-spritz-remote-file-inclusion (VulnCheck Advisory: WordPress Plugin WP with Spritz 1.0 Remote File Inclusion)