Lucene search

K
cve[email protected]CVE-2023-2688
HistoryJun 09, 2023 - 6:16 a.m.

CVE-2023-2688

2023-06-0906:16:11
web.nvd.nist.gov
15
wordpress
file upload
path traversal
vulnerability
security
nvd

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.6%

The WordPress File Upload and WordPress File Upload Pro plugins for WordPress are vulnerable to Path Traversal in versions up to, and including, 4.19.1 via the vulnerable parameter wfu_newpath. This allows administrator-level attackers to move files uploaded with the plugin (located in wp-content/uploads by default) outside of the web root.

Affected configurations

Vulners
NVD
Node
nickbosswordpress_file_uploadRange4.19.1
OR
unknownwordpress_file_upload_proRange4.19.1

CNA Affected

[
  {
    "vendor": "nickboss",
    "product": "WordPress File Upload",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "4.19.1",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "Unknown",
    "product": "WordPress File Upload Pro",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "4.19.1",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.6%

Related for CVE-2023-2688