CVE-2023-7082

The Import any XML or CSV File to WordPress plugin before 3.7.3 accepts all zip files and automatically extracts the zip file into a publicly accessible directory without sufficiently validating the extracted file type. This may allows high privilege users such as administrator to upload an executable file type leading to remote code execution.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:soflyy:export_any_wordpress_data_to_xml\/csv:*:*:*:*:*:wordpress:*:*

History

26 Jan 2024, 19:48

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CPE cpe:2.3:a:soflyy:export_any_wordpress_data_to_xml\/csv:*:*:*:*:*:wordpress:*:*
References () https://wpscan.com/vulnerability/7f947305-7a72-4c59-9ae8-193f437fd04e/ - () https://wpscan.com/vulnerability/7f947305-7a72-4c59-9ae8-193f437fd04e/ - Exploit, Third Party Advisory

22 Jan 2024, 20:28

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-22 20:15

Updated : 2024-02-05 00:22


NVD link : CVE-2023-7082

Mitre link : CVE-2023-7082

CVE.ORG link : CVE-2023-7082


JSON object : View

Products Affected

soflyy

  • export_any_wordpress_data_to_xml\/csv