Input validation vulnerability in Payment Gateways Caller for WP e-Commerce 0.1.1

The Payment Gateways Caller for WP e-Commerce plugin for WordPress is vulnerable to a security issue known as Local File Inclusion. This affects versions before 0.1.1, and the vulnerability exists in the wpscmc_load_merchant function. By exploiting this vulnerability, attackers can include and execute any type of file on the server, including PHP files. If an attacker succeeds in doing this, they can bypass access controls, steal sensitive data, or even execute malicious code on the server. This is possible even if the server only allows uploads of images and other seemingly “safe” file types.

Detected in:

Payment Gateways Caller for WP e-Commerce fixed vulnerable versions: >= * < 0.1.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.