This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Path Traversal (CWE-22) in Adning Advertising plugin. π **Consequences**: Attackers can delete arbitrary files or upload malicious payloads, compromising server integrity.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: Improper input validation allowing **Path Traversal**. β οΈ **CWE**: CWE-22. The plugin fails to sanitize file paths, enabling unauthorized file system access.
π **Attacker Actions**: Upload malicious files (Webshells). ποΈ Delete critical server files. π Access sensitive data via path traversal. π **Privileges**: Server-level access depending on web server user rights.
π₯ **Exploitation**: **YES**. Active exploitation in the wild reported. π **PoC**: Available via Nuclei templates. π’ **Sources**: Wordfence & Nintechnet blogs confirm active threats.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for **Adning Advertising** plugin. π§ͺ **Tool**: Use Nuclei templates (CVE-2020-36728.yaml). π **Indicator**: Check for version < 1.5.6. π΅οΈββοΈ **Verify**: Test file deletion/upload endpoints if safe.