Description
The Canto plugin for WordPress is vulnerable to Remote File Inclusion in versions up to, and including, 3.0.4 via the 'wp_abspath' parameter. This allows unauthenticated attackers to include and execute arbitrary remote code on the server, provided that allow_url_include is enabled. Local File Inclusion is also possible, albeit less useful because it requires that the attacker be able to upload a malicious php file via FTP or some other means into a directory readable by the web server.
Published: 2023-08-12
Score: 9.8 Critical
EPSS: 87.8% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Title Canto <= 3.0.4 - Unauthenticated Remote File Inclusion
Weaknesses CWE-98

Fri, 11 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:13:38.027Z

Reserved: 2023-06-28T19:14:28.550Z

Link: CVE-2023-3452

cve-icon Vulnrichment

Updated: 2024-08-02T06:55:03.333Z

cve-icon NVD

Status : Modified

Published: 2023-08-12T03:15:09.330

Modified: 2026-04-08T19:18:26.317

Link: CVE-2023-3452

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses