Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2021-25082Path Traversal in Popup Builder

CWE-22Path Traversal5 documents5 sources
Severity
8.8HIGHNVD
EPSS
19.9%
top 4.54%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedFeb 21
Latest updateFeb 22

Description

The Popup Builder WordPress plugin before 4.0.7 does not validate and sanitise the sgpb_type parameter before using it in a require statement, leading to a Local File Inclusion issue. Furthermore, since the beginning of the string can be controlled, the issue can lead to RCE vulnerability via wrappers such as PHAR

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages1 packages

🔴Vulnerability Details

3
GHSA
GHSA-rgh6-hx6g-h7q7: The Popup Builder WordPress plugin before 42022-02-22
CVEList
Popup Builder < 4.0.7 - LFI to RCE2022-02-21
VulnCheck
sygnoos popup_builder Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')2021

💥Exploits & PoCs

1
Nuclei
WordPress Popup Builder < 4.0.7 - Remote Code Execution
CVE-2021-25082 — Path Traversal in Popup Builder | cvebase