The Canto plugin for WordPress is vulnerable to Remote File Inclusion in versions up to, and including, 3.0.4 via the 'wp_abspath' parameter. This allows unauthenticated attackers to include and execute arbitrary remote code on the server, provided that allow_url_include is enabled. Local File Inclusion is also possible, albeit less useful because it requires that the attacker be able to upload a malicious php file via FTP or some other means into a directory readable by the web server.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Canto <= 3.0.4 - Unauthenticated Remote File Inclusion | |
| Weaknesses | CWE-98 |
Fri, 11 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:13:38.027Z
Reserved: 2023-06-28T19:14:28.550Z
Link: CVE-2023-3452
Updated: 2024-08-02T06:55:03.333Z
Status : Modified
Published: 2023-08-12T03:15:09.330
Modified: 2026-04-08T19:18:26.317
Link: CVE-2023-3452
No data.
OpenCVE Enrichment
No data.
Weaknesses