漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
ShopLentor <= 3.2.5 - Unauthenticated Local PHP File Inclusion via 'load_template'
漏洞信息
The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.2.5 via the 'load_template' function. This makes it possible for unauthenticated attackers to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
漏洞信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞
对路径名的限制不恰当(路径遍历)
漏洞
WordPress plugin ShopLentor 路径遍历漏洞
漏洞信息
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin ShopLentor 3.2.5及之前版本存在路径遍历漏洞,该漏洞源于load_template函数存在本地文件包含漏洞,可能导致执行任意PHP代码。
漏洞信息
N/A
漏洞
N/A