WordPress.Plugin.WP.with.Spritz.Remote.File.Inclusion
Description
This indicates a possible attempt to exploit an Arbitrary File Inclusion vulnerability in WordPress Plugin WP with Spritz.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application while handling maliciously crafted requests. A remote attacker can exploit this to read arbitrary local files in the system.
Affected Products
WordPress Plugin WP with Spritz 1.0.
Impact
Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.
Recommended Actions
Currently we are unaware of any vendor supplied patch or updates available for this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |