WordPress A Page Flip Book Plugin for WordPress 'pageflipbook_language' Parameter Arbitrary Code Execution

High Nessus Plugin ID 62414


The remote web server contains a PHP application that is affected by an arbitrary code execution vulnerability.


The version of the 'A Page Flip Book' plugin for WordPress installed on the remote host is affected by an arbitrary code execution vulnerability due to a failure to properly sanitize user-supplied input to the 'pageflipbook_language' parameter in the pageflipbook.php script. An unauthenticated, remote attacker can exploit this issue to view arbitrary files or execute arbitrary PHP code on the remote host.

Note that successful exploitation of this issue has resulted in a persistent change to the site. To undo this change, reset the language option for the plugin in the WordPress admin panel.


Unknown at this time.

See Also


Plugin Details

Severity: High

ID: 62414

File Name: wordpress_apageflipbook_lfi.nasl

Version: 1.11

Type: remote

Family: CGI abuses

Published: 2012/10/03

Updated: 2019/12/04

Dependencies: 11936, 18297

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Required KB Items: installed_sw/WordPress, www/PHP

Exploit Available: false

Exploit Ease: No exploit is required

Exploited by Nessus: true

Vulnerability Publication Date: 2012/07/10

Exploitable With

Elliot (WordPress A Page Flip Book 2.3 LFI)

Reference Information

CVE: CVE-2012-6652

BID: 54368