Multiple PHP remote file inclusion vulnerabilities in SOLMETRA SPAW Editor 1.0.6 and 1.0.7 allow remote attackers to execute arbitrary PHP code via a URL in the spaw_dir parameter in dialogs/ scripts including (1) a.php, (2) collorpicker.php, (3) img.php, (4) img_library.php, (5) table.php, or (6) td.php.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Spaw_editor | Solmetra | 1.0.6 (including) | 1.0.6 (including) |
Spaw_editor | Solmetra | 1.0.7 (including) | 1.0.7 (including) |