Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2016-10956 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical Input Validation Error in the WordPress 'mail-masta' plugin. πŸ“‰ **Consequences**: Allows Local File Inclusion (LFI).…

Q2Root Cause? (CWE/Flaw)

πŸ” **Root Cause**: CWE-20 (Improper Input Validation). The plugin fails to sanitize user-supplied input in specific PHP files (`count_of_send.php` and `csvexport.php`).…

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: WordPress sites using the **mail-masta** plugin. Specifically **Version 1.0**. πŸ“¦ **Component**: The plugin itself is the weak link, not the core WordPress engine. Check your plugin list immediately! πŸ•΅οΈβ€β™‚οΈ

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: Can read arbitrary local files. πŸ“‚ **Key Target**: `wp-config.php` (contains DB credentials).…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: LOW. No authentication required for exploitation. πŸšͺ **Access**: Publicly accessible endpoints (`count_of_send.php`, `csvexport.php`) can be targeted directly via HTTP requests.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exploits**: YES. Multiple PoCs exist on GitHub (e.g., by p0dalirius, Hackhoven). πŸ› οΈ **Tools**: Automated scanners like ProjectDiscovery Nuclei also have templates.…

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: 1. Scan for `mail-masta` plugin version 1.0. 2. Test URLs: `http://target/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php`. 3. Look for file content in response.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: The plugin is old (2016). Official patches may be unavailable or the plugin deprecated. 🚫 **Status**: The vendor info is 'n/a', suggesting the developer may have abandoned it.…

Q9What if no patch? (Workaround)

πŸ›‘οΈ **Workaround**: 1. **Disable/Uninstall** the plugin immediately if not essential. 🚫 2. If must keep, restrict access to `count_of_send.php` and `csvexport.php` via `.htaccess` or WAF rules. 🧱 3.…

Q10Is it urgent? (Priority Suggestion)

🚨 **Urgency**: HIGH. Since it requires no auth and has public exploits, it is actively abused. πŸƒβ€β™‚οΈ **Priority**: Patch or remove immediately. Do not wait. The risk of credential theft is immediate and severe. ⏳