The EditorsKit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation on the 'import_styles' function in versions up to, and including, 1.40.3. This makes it possible for authenticated attackers with administrator-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
References
Configurations
History
12 Feb 2024, 20:50
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-434 | |
Summary |
|
|
First Time |
Extendify
Extendify editorskit |
|
CPE | cpe:2.3:a:extendify:editorskit:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/block-options/tags/1.40.3/includes/addons/styles-manager/rest-api/gutenberghub-styles-import-export-controller.php#L100 - Issue Tracking | |
References | () https://plugins.trac.wordpress.org/changeset/3010794/block-options - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/4528f9a1-7027-4aa9-b006-bea84aa19c84?source=cve - Third Party Advisory |
05 Feb 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-05 22:15
Updated : 2024-02-12 20:50
NVD link : CVE-2023-6635
Mitre link : CVE-2023-6635
CVE.ORG link : CVE-2023-6635
JSON object : View
Products Affected
extendify
- editorskit
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type