CVE-2023-3452

CRITICAL NUCLEI LAB

Canto plugin for WordPress <=3.0.4 - RCE

Title source: llm

Description

The Canto plugin for WordPress is vulnerable to Remote File Inclusion in versions up to, and including, 3.0.4 via the 'wp_abspath' parameter. This allows unauthenticated attackers to include and execute arbitrary remote code on the server, provided that allow_url_include is enabled. Local File Inclusion is also possible, albeit less useful because it requires that the attacker be able to upload a malicious php file via FTP or some other means into a directory readable by the web server.

Exploits (3)

nomisec WORKING POC 16 stars
by leoanggal1 · poc
https://github.com/leoanggal1/CVE-2023-3452-PoC
nomisec WORKING POC
by puppetma4ster · poc
https://github.com/puppetma4ster/Metasploit-Wordpress-Canto-Exploit-RCE
nomisec WORKING POC
by Alpastx · poc
https://github.com/Alpastx/CVE-2023-3452---WordPress-Canto-Plugin-RCE

Nuclei Templates (1)

WordPress Canto Plugin <= 3.0.4 - File Inclusion
CRITICALVERIFIEDby omarkurt

Scores

CVSS v3 9.8
EPSS 0.8705
EPSS Percentile 99.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-98
Status published
Products (2)
canto/canto < 3.0.4
flightbycanto/Canto < 3.0.4
Published Aug 12, 2023
Tracked Since Feb 18, 2026