8.8
CVE-2023-4243
- EPSS 0.53%
- Veröffentlicht 09.08.2023 04:15:10
- Zuletzt bearbeitet 21.11.2024 08:34:41
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
FULL - Customer <= 2.2.3 - Authenticated(Subscriber+) Improper Authorization to Arbitrary Plugin Installation
The FULL - Customer plugin for WordPress is vulnerable to Arbitrary File Upload via the /install-plugin REST route in versions up to, and including, 2.2.3 due to improper authorization. This allows authenticated attackers with subscriber-level permissions and above to execute code by installing plugins from arbitrary remote locations including non-repository sources onto the site, granted they are packaged as a valid WordPress plugin.
Mögliche Gegenmaßnahme
FULL – Cliente: Update to version 2.3, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
FULL – Cliente
Version
*-2.2.3
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Full ≫ Full - Customer SwPlatformwordpress Version <= 2.2.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.53% | 0.664 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-434 Unrestricted Upload of File with Dangerous Type
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.