CVE-2018-20463
HIGH EXPLOITED NUCLEIJsmol2wp - Path Traversal
Title source: ruleDescription
An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF.
Exploits (1)
Nuclei Templates (1)
WordPress JSmol2WP <=1.07 - Local File Inclusion
HIGHVERIFIEDby vinit989
Scores
CVSS v3
7.5
EPSS
0.8451
EPSS Percentile
99.3%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2024-09-19
CWE
CWE-22
Status
published
Products (1)
jsmol2wp_project/jsmol2wp
1.07
Published
Dec 25, 2018
Tracked Since
Feb 18, 2026