CVE-2015-4153

MEDIUM

Description

Directory traversal vulnerability in the zM Ajax Login & Register plugin before 1.1.0 for WordPress allows remote attackers to include and execute arbitrary php files via a relative path in the template parameter in a load_template action to wp-admin/admin-ajax.php.

References

http://packetstormsecurity.com/files/132172/WordPress-zM-Ajax-Login-Register-1.0.9-Local-File-Inclusion.html

http://www.securityfocus.com/archive/1/535682/100/0/threaded

http://www.securityfocus.com/bid/75041

https://security.gentoo.org/glsa/201512-10

https://wordpress.org/plugins/zm-ajax-login-register/changelog/

https://www.exploit-db.com/exploits/37200/

Details

Source: MITRE

Published: 2015-06-10

Updated: 2018-10-09

Type: CWE-22

Risk Information

CVSS v2.0

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM