9.8
CVE-2023-5843
- EPSS 9.14%
- Veröffentlicht 30.10.2023 14:15:10
- Zuletzt bearbeitet 21.11.2024 08:42:36
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Ads by datafeedr.com <= 1.1.3 - Unauthenticated (Limited) Remote Code Execution
The Ads by datafeedr.com plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 1.1.3 via the 'dfads_ajax_load_ads' function. This allows unauthenticated attackers to execute code on the server. The parameters of the callable function are limited, they cannot be specified arbitrarily.
Mögliche Gegenmaßnahme
Ads by datafeedr.com: Update to version 1.2.0, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Ads by datafeedr.com
Version
*-1.1.3
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Datafeedr ≫ Ads By Datafeedr.Com SwPlatformwordpress Version <= 1.1.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 9.14% | 0.923 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| security@wordfence.com | 9 | 2.2 | 6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
|