This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Critical Local File Inclusion (LFI) in WordPress plugin 'Web Directory Free'. π₯ **Consequences**: Attackers can read sensitive server files. No authentication required. Data breach risk is HIGH.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: Missing input validation. π **Flaw**: The `include()` function uses user-supplied parameters without checking them first. This is a classic LFI flaw.
Q3Who is affected? (Versions/Components)
π¦ **Affected**: WordPress Plugin: **Web Directory Free**. π **Versions**: All versions **<= 1.7.2**. β **Safe**: Version **1.7.3** and above.
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Attacker Actions**: Read arbitrary files on the server. π **Data Exposed**: Config files, source code, credentials, system info. π **Privileges**: Unauthenticated access. Low barrier to entry.
Q5Is exploitation threshold high? (Auth/Config)
β‘ **Threshold**: VERY LOW. π **Auth**: None required. βοΈ **Config**: Standard installation vulnerable. π― **Ease**: Simple HTTP request needed.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π₯ **Public Exploit**: YES. π **PoC**: Available on GitHub (Nxploited/CVE-2024-3673). π€ **Automation**: Nuclei templates exist for mass scanning. β οΈ **Status**: Actively exploitable in the wild.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for 'Web Directory Free' plugin. π **Version Check**: Verify if version is < 1.7.3. π οΈ **Tools**: Use Nuclei or WPScan to detect LFI endpoints. π **Manual**: Test `include` parameter injection.
Q8Is it fixed officially? (Patch/Mitigation)
π§ **Official Fix**: YES. π¦ **Patch**: Update to **Version 1.7.3**. β **Action**: Immediate update recommended by vendor.
Q9What if no patch? (Workaround)
π§ **No Patch?**: Disable the plugin immediately. π **WAF**: Block requests with suspicious `include` parameters. π§Ή **Audit**: Check server logs for unauthorized file reads. π« **Remove**: If not needed, uninstall completeβ¦
π¨ **Urgency**: CRITICAL. π **Priority**: P1 (Immediate Action). β³ **Risk**: High exposure due to no auth needed. π‘ **Advice**: Patch NOW. Do not wait.