CVE-2023-0159

The Extensive VC Addons for WPBakery page builder WordPress plugin before 1.9.1 does not validate a parameter passed to the php extract function when loading templates, allowing an unauthenticated attacker to override the template path to read arbitrary files from the hosts file system. This may be escalated to RCE using PHP filter chains.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wprealize:extensive_vc_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:36

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/239ea870-66e5-4754-952e-74d4dd60b809 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/239ea870-66e5-4754-952e-74d4dd60b809 - Exploit, Third Party Advisory

05 Dec 2023, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-13 15:15

Updated : 2024-11-21 07:36


NVD link : CVE-2023-0159

Mitre link : CVE-2023-0159

CVE.ORG link : CVE-2023-0159


JSON object : View

Products Affected

wprealize

  • extensive_vc_addons_for_wpbakery_page_builder
CWE

No CWE.