The Import any XML or CSV File to WordPress plugin before 3.7.3 accepts all zip files and automatically extracts the zip file into a publicly accessible directory without sufficiently validating the extracted file type. This may allows high privilege users such as administrator to upload an executable file type leading to remote code execution.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/7f947305-7a72-4c59-9ae8-193f437fd04e/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
26 Jan 2024, 19:48
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
CPE | cpe:2.3:a:soflyy:export_any_wordpress_data_to_xml\/csv:*:*:*:*:*:wordpress:*:* | |
References | () https://wpscan.com/vulnerability/7f947305-7a72-4c59-9ae8-193f437fd04e/ - Exploit, Third Party Advisory |
22 Jan 2024, 20:28
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-22 20:15
Updated : 2024-02-05 00:22
NVD link : CVE-2023-7082
Mitre link : CVE-2023-7082
CVE.ORG link : CVE-2023-7082
JSON object : View
Products Affected
soflyy
- export_any_wordpress_data_to_xml\/csv
CWE