Description
PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.
Remediation
References
Related Vulnerabilities
MySQL Other Vulnerability (CVE-2005-2558)
WordPress Plugin Booster for WooCommerce Multiple Cross-Site Scripting Vulnerabilities (5.4.8)
WordPress Plugin WP Activity Log SQL Injection (4.1.4)
WordPress Plugin Click to Chat Cross-Site Scripting (1.6)
WordPress Plugin WP Google Fonts Cross-Site Scripting (3.1.3)