Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 18 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 17 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Wp-with-spritz Wp-with-spritz wp With Spritz |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Wp-with-spritz Wp-with-spritz wp With Spritz |
Sun, 17 May 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress Plugin WP with Spritz 1.0 contains a remote file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by injecting file paths into the url parameter. Attackers can send GET requests to wp.spritz.content.filter.php with malicious url values to access sensitive files like system configuration and credentials. | |
| Title | WordPress Plugin WP with Spritz 1.0 Remote File Inclusion | |
| Weaknesses | CWE-98 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-18T14:38:08.413Z
Reserved: 2026-05-17T11:43:06.646Z
Link: CVE-2018-25329
Updated: 2026-05-18T14:38:04.398Z
Status : Deferred
Published: 2026-05-17T13:16:44.443
Modified: 2026-05-18T17:05:46.240
Link: CVE-2018-25329
No data.
OpenCVE Enrichment
Updated: 2026-05-17T17:00:02Z