This exploit demonstrates a Local File Inclusion (LFI) vulnerability in Cartweaver 3's AdminHelp.php. The vulnerability arises from unsanitized user input in the 'helpFileName' parameter, allowing directory traversal to read arbitrary files.
Classification
Working Poc 90%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target:Cartweaver 3
No auth needed
Prerequisites:Access to the /admin/helpfiles/AdminHelp.php endpoint