This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: A PHP Remote File Inclusion (RFI) flaw in 'Build App Online'. π **Consequences**: Attackers can inject malicious PHP code via uncontrolled file paths.β¦
π‘οΈ **Root Cause**: CWE-98 (Improper Control of Filename for Include/Require). π **Flaw**: The plugin fails to sanitize user input in PHP `include` or `require` statements.β¦
π₯ **Affected**: WordPress Plugin 'Build App Online'. π¦ **Version**: 1.0.23 and earlier. π’ **Vendor**: hakeemnala. π **Platform**: WordPress sites running this specific plugin version. π **Published**: Jan 7, 2025.
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Hackers Can**: Execute arbitrary PHP code on the server. π **Access**: Read sensitive local files (e.g., wp-config.php). π **Privileges**: Gain full administrative control (RCE).β¦
π **Threshold**: LOW. π« **Auth**: No authentication required (PR:N). π±οΈ **UI**: No user interaction needed (UI:N). π **Network**: Remote exploitability (AV:N). π― **Complexity**: Low (AC:L). Easy to exploit for anyone. β‘
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exp?**: No specific PoC code listed in data. π **Status**: VDB entries exist (Patchstack). π **Wild Exp**: Likely possible due to low complexity.β¦
π **Self-Check**: Scan for 'Build App Online' plugin. π **Version**: Check if version β€ 1.0.23. π§ͺ **Test**: Look for LFI/RFI parameters in plugin URLs. π οΈ **Tools**: Use WPScan or DAST tools to detect CWE-98 patterns.β¦
π§ **Fixed?**: Yes, implied by CVE publication. π₯ **Action**: Update plugin to latest version. π« **Avoid**: Do not use version 1.0.23 or older. π **Patch**: Check vendor 'hakeemnala' for official update.β¦
π₯ **Urgency**: HIGH. π¨ **CVSS**: 9.8 (Critical). β³ **Risk**: Remote, unauthenticated, high impact. π **Action**: Patch NOW. π **Priority**: Top of the list. π‘οΈ **Protect**: Your WordPress site is at immediate risk. β‘