The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation on the 'gspb_save_files' function in versions up to, and including, 7.6.2. This makes it possible for authenticated attackers with administrator-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
References
Configurations
History
10 Jun 2025, 11:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:wpsoul:greenshift:*:*:*:*:*:wordpress:*:* | |
First Time |
Wpsoul
Wpsoul greenshift |
21 Nov 2024, 08:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/browser/greenshift-animation-and-page-builder-blocks/trunk/settings.php?rev=3006373#L867 - Patch | |
References | () https://plugins.trac.wordpress.org/changeset/3009030/greenshift-animation-and-page-builder-blocks/trunk/settings.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/821462d6-970e-4e3e-b91d-e7153296ba9f?source=cve - Third Party Advisory |
17 Jan 2024, 21:20
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-11 09:15
Updated : 2025-06-10 11:44
NVD link : CVE-2023-6636
Mitre link : CVE-2023-6636
CVE.ORG link : CVE-2023-6636
JSON object : View
Products Affected
wpsoul
- greenshift
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type