WordPress Plugin WP with Spritz 1.0 contains a remote file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by injecting file paths into the url parameter. Attackers can send GET requests to wp.spritz.content.filter.php with malicious url values to access sensitive files like system configuration and credentials.
Metrics
Affected Vendors & Products
References
History
Sun, 17 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Wp-with-spritz Wp-with-spritz wp With Spritz |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Wp-with-spritz Wp-with-spritz wp With Spritz |
Sun, 17 May 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress Plugin WP with Spritz 1.0 contains a remote file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by injecting file paths into the url parameter. Attackers can send GET requests to wp.spritz.content.filter.php with malicious url values to access sensitive files like system configuration and credentials. | |
| Title | WordPress Plugin WP with Spritz 1.0 Remote File Inclusion | |
| Weaknesses | CWE-98 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-05-17T12:11:34.667Z
Updated: 2026-05-17T12:11:34.667Z
Reserved: 2026-05-17T11:43:06.646Z
Link: CVE-2018-25329
No data.
Status : Received
Published: 2026-05-17T13:16:44.443
Modified: 2026-05-17T13:16:44.443
Link: CVE-2018-25329
No data.