WordPress Plugin WP with Spritz 1.0 contains a remote file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by injecting file paths into the url parameter. Attackers can send GET requests to wp.spritz.content.filter.php with malicious url values to access sensitive files like system configuration and credentials.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 17 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Wp-with-spritz Wp-with-spritz wp With Spritz |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Wp-with-spritz Wp-with-spritz wp With Spritz |
Sun, 17 May 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress Plugin WP with Spritz 1.0 contains a remote file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by injecting file paths into the url parameter. Attackers can send GET requests to wp.spritz.content.filter.php with malicious url values to access sensitive files like system configuration and credentials. | |
| Title | WordPress Plugin WP with Spritz 1.0 Remote File Inclusion | |
| Weaknesses | CWE-98 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-17T12:11:34.667Z
Reserved: 2026-05-17T11:43:06.646Z
Link: CVE-2018-25329
No data.
Status : Received
Published: 2026-05-17T13:16:44.443
Modified: 2026-05-17T13:16:44.443
Link: CVE-2018-25329
No data.
OpenCVE Enrichment
Updated: 2026-05-17T17:00:02Z
Weaknesses