CVE-2015-4153

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Directory traversal vulnerability in the zM Ajax Login & Register plugin before 1.1.0 for WordPress allows remote attackers to include and execute arbitrary php files via a relative path in the template parameter in a load_template action to wp-admin/admin-ajax.php.

References

http://packetstormsecurity.com/files/132172/WordPress-zM-Ajax-Login-Register-1.0.9-Local-File-Inclusion.html

http://www.securityfocus.com/archive/1/535682/100/0/threaded

http://www.securityfocus.com/bid/75041

https://security.gentoo.org/glsa/201512-10

https://wordpress.org/plugins/zm-ajax-login-register/changelog/

https://www.exploit-db.com/exploits/37200/

Details

Source: MITRE

Published: 2015-06-10

Updated: 2018-10-09

Type: CWE-22

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:zanematthew:zm_ajax_login_\&_register:*:*:*:*:*:wordpress:*:* versions up to 1.0.9 (inclusive)

Tenable Plugins

View all (1 total)

IDNameProductFamilySeverity
87710GLSA-201512-10 : Mozilla Products: Multiple vulnerabilities (Bar Mitzvah) (Logjam)NessusGentoo Local Security Checks
critical