#VU14204 Path traversal in Site Editor - CVE-2018-7422
Published: August 6, 2018 / Updated: December 6, 2022
Site Editor
WordPress.ORG
Description
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists due to insufficient sanitization of user-supplied input submitted to the ajax_path parameter that is processed by the editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php code. A remote attacker can send a specially crafted request that submits malicious input, conduct directory traversal attack access arbitrary files on the system.