First published: Mon Mar 28 2022(Updated: )
The String locator WordPress plugin before 2.5.0 does not properly validate the path of the files to be searched, allowing high privilege users such as admin to query arbitrary files on the web server via a path traversal vector. Furthermore, due to a flaw in the search, allowing a pattern to be provided, which will be used to output the relevant matches from the matching file, all content of the file can be disclosed.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
String Locator | <2.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0493 is a vulnerability in the String locator WordPress plugin before version 2.5.0 that allows high privilege users to query arbitrary files on the web server via a path traversal vector.
CVE-2022-0493 affects the String locator WordPress plugin before version 2.5.0, allowing high privilege users to query arbitrary files on the web server.
CVE-2022-0493 has a severity rating of 4.9 (medium).
To fix CVE-2022-0493, upgrade to version 2.5.0 or later of the String locator WordPress plugin.
You can find more information about CVE-2022-0493 on the official WordPress plugin directory and WPScan vulnerability database.