.. / CVE-2022-1390

Exploit for WordPress Admin Word Count Column 2.2 - Local File Inclusion (CVE-2022-1390)

Description:

The plugin does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique.

Nuclei Template

View the template here CVE-2022-1390.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-1390.yaml
Copy

References:

https://github.com/ARPSyndicate/cvemon
https://wpscan.com/vulnerability/6293b319-dc4f-4412-9d56-55744246c990
https://nvd.nist.gov/vuln/detail/CVE-2022-1390
https://wordpress.org/plugins/admin-word-count-column/
https://packetstormsecurity.com/files/166476/WordPress-Admin-Word-Count-Column-2.2-Local-File-Inclusion.html