WordPress.Plugin.Gwolle.Guestbook.Remote.File.Inclusion

description-logoDescription

This indicates an attack attempt to exploit a Remote File Inclusion vulnerability in WordPress Plugin Gwolle Guestbook.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application when handling a craft HTTP request. A remote attacker may be able exploit this to execute arbitrary code within the context of the application.

affected-products-logoAffected Products

WordPress Plugin Gwolle Guestbook version 1.5.3 and prior

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Upgrade to the latest version from the vendor.
https://wordpress.org/plugins/gwolle-gb/#developers

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-10-24 14.710 Default_action:pass:drop
2019-06-20 14.636

References

38861