### [CVE-2023-3452](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3452) ![](https://img.shields.io/static/v1?label=Product&message=Canto&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%203.0.4%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20('PHP%20Remote%20File%20Inclusion')&color=brighgreen) ### Description The Canto plugin for WordPress is vulnerable to Remote File Inclusion in versions up to, and including, 3.0.4 via the 'wp_abspath' parameter. This allows unauthenticated attackers to include and execute arbitrary remote code on the server, provided that allow_url_include is enabled. Local File Inclusion is also possible, albeit less useful because it requires that the attacker be able to upload a malicious php file via FTP or some other means into a directory readable by the web server. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0x1x02/Canto-RFI-RCE-Exploit - https://github.com/leoanggal1/CVE-2023-3452-PoC - https://github.com/nomi-sec/PoC-in-GitHub