The WP EXtra plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the register() function in versions up to, and including, 6.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to modify the contents of the .htaccess files located in a site's root directory or /wp-content and /wp-includes folders and achieve remote code execution.
References
Link | Resource |
---|---|
https://giongfnef.gitbook.io/giongfnef/cve/cve-2023-5311 | Exploit Third Party Advisory |
https://plugins.trac.wordpress.org/changeset/2977703/wp-extra | Patch |
https://www.wordfence.com/threat-intel/vulnerabilities/id/87e3dd5e-0d77-4d78-8171-0beaf9482699?source=cve | Patch Third Party Advisory |
https://giongfnef.gitbook.io/giongfnef/cve/cve-2023-5311 | Exploit Third Party Advisory |
https://plugins.trac.wordpress.org/changeset/2977703/wp-extra | Patch |
https://www.wordfence.com/threat-intel/vulnerabilities/id/87e3dd5e-0d77-4d78-8171-0beaf9482699?source=cve | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 08:41
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-25 18:17
Updated : 2024-11-21 08:41
NVD link : CVE-2023-5311
Mitre link : CVE-2023-5311
CVE.ORG link : CVE-2023-5311
JSON object : View
Products Affected
wpvnteam
- wp_extra
CWE
CWE-862
Missing Authorization