8.8
CVE-2023-6743
- EPSS 5.84%
- Veröffentlicht 29.05.2024 05:16:08
- Zuletzt bearbeitet 30.01.2025 16:09:46
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Unlimited Elements for Elementor <= 1.5.89 - Authenticated(Contributor+) Remote Code Execution via template import
The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.5.89 via the template import functionality. This makes it possible for authenticated attackers, with contributor access and above, to execute code on the server.
Mögliche Gegenmaßnahme
Unlimited Elements For Elementor: Update to version 1.5.91, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Unlimited Elements For Elementor
Version
* - 1.5.89
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Unlimited-elements ≫ Unlimited Elements For Elementor SwPlatformwordpress Version <= 1.5.89
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 5.84% | 0.901 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.