CVE-2018-7422

HIGH EXPLOITED IN THE WILD NUCLEI

Siteeditor Site Editor < 1.1.1 - Path Traversal

Title source: rule

Description

A Local File Inclusion vulnerability in the Site Editor plugin through 1.1.1 for WordPress allows remote attackers to retrieve arbitrary files via the ajax_path parameter to editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php, aka absolute path traversal.

Exploits (6)

exploitdb WORKING POC VERIFIED
by Nicolas Buzy-Debat · textwebappsphp
https://www.exploit-db.com/exploits/44340
nomisec WORKING POC 2 stars
by JacobEbben · infoleak
https://github.com/JacobEbben/CVE-2018-7422
nomisec WORKING POC 1 stars
by ndr-repo · infoleak
https://github.com/ndr-repo/CVE-2018-7422
nomisec WORKING POC 1 stars
by 0x00-0x00 · remote
https://github.com/0x00-0x00/CVE-2018-7422
nomisec SCANNER
by nguyenduytoi · infoleak
https://github.com/nguyenduytoi/CVE-2018-7422

Nuclei Templates (1)

WordPress Site Editor <=1.1.1 - Local File Inclusion
HIGHby LuskaBol,0x240x23elu

Scores

CVSS v3 7.5
EPSS 0.9041
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2021-04-12
InTheWild.io 2021-04-12
CWE
CWE-22 CWE-829
Status published
Products (1)
siteeditor/site_editor < 1.1.1
Published Mar 19, 2018
Tracked Since Feb 18, 2026