CVE-2024-4936

The Canto plugin for WordPress is vulnerable to Remote File Inclusion in all versions up to, and including, 3.0.8 via the abspath parameter. This makes it possible for unauthenticated attackers to include remote files on the server, resulting in code execution. This required allow_url_include to be enabled on the target site in order to exploit.
Configurations

Configuration 1 (hide)

cpe:2.3:a:canto:canto:*:*:*:*:*:wordpress:*:*

History

06 Aug 2024, 18:29

Type Values Removed Values Added
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/95a68ae0-36da-499b-a09d-4c91db8aa338?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/95a68ae0-36da-499b-a09d-4c91db8aa338?source=cve - Patch, Third Party Advisory
References () https://plugins.trac.wordpress.org/browser/canto/trunk/includes/lib/sizes.php#L15 - () https://plugins.trac.wordpress.org/browser/canto/trunk/includes/lib/sizes.php#L15 - Patch
CPE cpe:2.3:a:canto:canto:*:*:*:*:*:wordpress:*:*
CWE NVD-CWE-Other
First Time Canto
Canto canto

14 Jun 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-14 05:15

Updated : 2024-08-06 18:29


NVD link : CVE-2024-4936

Mitre link : CVE-2024-4936


JSON object : View

Products Affected

canto

  • canto