8.8

CVE-2024-7419

WP All Export Pro <= 1.9.1 - Unauthenticated Remote Code Execution via Custom Export Fields

The WP ALL Export Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.9.1 via the custom export fields. This is due to the missing input validation and sanitization of user-supplied data. This makes it possible for unauthenticated attackers to inject arbitrary PHP code into form fields that get executed on the server during the export, potentially leading to a complete site compromise. 
As a prerequisite, the custom export field should include fields containing user-supplied data.
Mögliche Gegenmaßnahme
WP All Export Pro: Update to version 1.9.2, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt WP All Export Pro
Version *-1.9.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SoflyyWp All Export SwEditionpro SwPlatformwordpress Version < 1.9.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.45% 0.633
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
security@wordfence.com 8.3 1.6 6
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.