<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Remote-File-Inclusion — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/remote-file-inclusion/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 17 May 2026 13:19:28 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/remote-file-inclusion/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress WP with Spritz Plugin 1.0 Remote File Inclusion</title><link>https://feed.craftedsignal.io/briefs/2026-05-wp-with-spritz-rfi/</link><pubDate>Sun, 17 May 2026 13:19:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wp-with-spritz-rfi/</guid><description>The WordPress WP with Spritz plugin version 1.0 is vulnerable to remote file inclusion (RFI), allowing unauthenticated attackers to read arbitrary files by injecting file paths into the `url` parameter of the `wp.spritz.content.filter.php` endpoint, potentially exposing sensitive system configuration and credentials.</description><content:encoded><![CDATA[<p>The WordPress WP with Spritz plugin, version 1.0, suffers from a remote file inclusion (RFI) vulnerability (CVE-2018-25329). This flaw enables unauthenticated attackers to read arbitrary files on the server. By crafting malicious GET requests to the <code>wp.spritz.content.filter.php</code> script and injecting file paths into the <code>url</code> parameter, attackers can bypass authentication mechanisms and access sensitive system files. This could include configuration files, credentials, and other data that could be leveraged for further malicious activities, such as privilege escalation or data exfiltration. The vulnerability allows attackers to directly read files from the compromised server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a WordPress site using the vulnerable WP with Spritz plugin 1.0.</li>
<li>The attacker crafts a malicious GET request targeting the <code>wp.spritz.content.filter.php</code> endpoint.</li>
<li>The attacker injects a file path into the <code>url</code> parameter of the GET request. This path points to a file the attacker wishes to read on the server.</li>
<li>The web server processes the request, and the vulnerable code in <code>wp.spritz.content.filter.php</code> includes the specified file without proper sanitization.</li>
<li>The contents of the targeted file are exposed as part of the HTTP response.</li>
<li>The attacker receives the HTTP response and extracts the file contents.</li>
<li>The attacker analyzes the exfiltrated data, searching for sensitive information such as database credentials, API keys, or configuration details.</li>
<li>The attacker uses the obtained information to further compromise the system or access other resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to read arbitrary files on the WordPress server. This may lead to the exposure of sensitive information, such as database credentials, configuration files, or even source code. The impact of this vulnerability can range from information disclosure to complete system compromise, depending on the sensitivity of the exposed files. The CVE has a CVSS v3.1 score of 7.5 (HIGH).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the provided Sigma rule <code>Detect CVE-2018-25329 Exploitation via wp.spritz.content.filter.php</code> to identify exploitation attempts by monitoring web server logs.</li>
<li>If the WP with Spritz plugin is installed, remove it from the WordPress installation until a patched version is available from the vendor.</li>
<li>Monitor web server logs for unusual GET requests targeting the <code>wp.spritz.content.filter.php</code> endpoint with suspicious <code>url</code> parameter values.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rfi</category><category>wordpress</category><category>cve-2018-25329</category><category>remote-file-inclusion</category></item></channel></rss>