CVE-2018-25329 PUBLISHED

WordPress Plugin WP with Spritz 1.0 Remote File Inclusion

Assigner: VulnCheck
Reserved: 17.05.2026 Published: 17.05.2026 Updated: 17.05.2026

WordPress Plugin WP with Spritz 1.0 contains a remote file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by injecting file paths into the url parameter. Attackers can send GET requests to wp.spritz.content.filter.php with malicious url values to access sensitive files like system configuration and credentials.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor wp-with-spritz
Product WP with Spritz
Versions
  • Version 1.0 is affected

Credits

  • Wadeek finder

References

Problem Types

  • Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') CWE