Description
The Canto plugin for WordPress is vulnerable to Remote File Inclusion in versions up to, and including, 3.0.4 via the 'wp_abspath' parameter. This allows unauthenticated attackers to include and execute arbitrary remote code on the server, provided that allow_url_include is enabled. Local File Inclusion is also possible, albeit less useful because it requires that the attacker be able to upload a malicious php file via FTP or some other means into a directory readable by the web server.
Exploits (3)
nomisec
WORKING POC
by puppetma4ster · poc
https://github.com/puppetma4ster/Metasploit-Wordpress-Canto-Exploit-RCE
nomisec
WORKING POC
by Alpastx · poc
https://github.com/Alpastx/CVE-2023-3452---WordPress-Canto-Plugin-RCE
Nuclei Templates (1)
WordPress Canto Plugin <= 3.0.4 - File Inclusion
CRITICALVERIFIEDby omarkurt
References (3)
Scores
CVSS v3
9.8
EPSS
0.8705
EPSS Percentile
99.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
Details
CWE
CWE-98
Status
published
Products (2)
canto/canto
< 3.0.4
flightbycanto/Canto
< 3.0.4
Published
Aug 12, 2023
Tracked Since
Feb 18, 2026