1 results (0.005 seconds)

CVSS: 9.8EPSS: 2%CPEs: 7EXPL: 1

PHP remote file inclusion vulnerability in ajax/savetag.php in the Theme Tuner plugin for WordPress before 0.8 allows remote attackers to execute arbitrary PHP code via a URL in the tt-abspath parameter. Una vulnerabilidad de inclusión de archivo PHP remoto en ajax/savetag.php en el plugin 'Theme Tuner' para Wordpress antes de v0.8 permite a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro TT-abspath. • http://plugins.trac.wordpress.org/changeset/492167/theme-tuner#file2 http://secunia.com/advisories/47722 http://spareclockcycles.org/2011/09/18/exploitring-the-wordpress-extension-repos http://wordpress.org/extend/plugins/theme-tuner/changelog http://www.securityfocus.com/bid/51636 https://exchange.xforce.ibmcloud.com/vulnerabilities/72626 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') •