CVE-2018-20463

HIGH EXPLOITED NUCLEI

Jsmol2wp - Path Traversal

Title source: rule

Description

An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF.

Exploits (1)

nomisec WRITEUP 2 stars
by Henry4E36 · poc
https://github.com/Henry4E36/CVE-2018-20463

Nuclei Templates (1)

WordPress JSmol2WP <=1.07 - Local File Inclusion
HIGHVERIFIEDby vinit989

Scores

CVSS v3 7.5
EPSS 0.8451
EPSS Percentile 99.3%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2024-09-19
CWE
CWE-22
Status published
Products (1)
jsmol2wp_project/jsmol2wp 1.07
Published Dec 25, 2018
Tracked Since Feb 18, 2026