CVE-2018-7422
HIGH EXPLOITED IN THE WILD NUCLEISiteeditor Site Editor < 1.1.1 - Path Traversal
Title source: ruleDescription
A Local File Inclusion vulnerability in the Site Editor plugin through 1.1.1 for WordPress allows remote attackers to retrieve arbitrary files via the ajax_path parameter to editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php, aka absolute path traversal.
Exploits (6)
exploitdb
WORKING POC
VERIFIED
by Nicolas Buzy-Debat · textwebappsphp
https://www.exploit-db.com/exploits/44340
Nuclei Templates (1)
WordPress Site Editor <=1.1.1 - Local File Inclusion
HIGHby LuskaBol,0x240x23elu
Scores
CVSS v3
7.5
EPSS
0.9041
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2021-04-12
InTheWild.io
2021-04-12
CWE
CWE-22
CWE-829
Status
published
Products (1)
siteeditor/site_editor
< 1.1.1
Published
Mar 19, 2018
Tracked Since
Feb 18, 2026