Access violation vulnerability in Admin Word Count Column 2.2

The Admin Word Count Column WordPress plugin up to version 2.2 did not properly check the path parameter given to readfile(). This allowed unauthenticated attackers to read any files on a server running an old version of PHP, by using a special technique called the null byte. Additionally, this vulnerability could also be used to take control of the server, by using a type of technique called Phar Deserialization.

Detected in:

Admin Word Count Column open vulnerable versions: >= * <= 2.2

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.