WordPress.Plugin.WP.with.Spritz.Remote.File.Inclusion

description-logoDescription

This indicates a possible attempt to exploit an Arbitrary File Inclusion vulnerability in WordPress Plugin WP with Spritz.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application while handling maliciously crafted requests. A remote attacker can exploit this to read arbitrary local files in the system.

affected-products-logoAffected Products

WordPress Plugin WP with Spritz 1.0.

Impact logoImpact

Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.

recomended-action-logoRecommended Actions

Currently we are unaware of any vendor supplied patch or updates available for this issue.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)