Lucene search

K
cvePatchstackCVE-2023-32297
HistoryMay 17, 2024 - 7:15 a.m.

CVE-2023-32297

2024-05-1707:15:54
CWE-22
Patchstack
web.nvd.nist.gov
33
cve-2023-32297
path traversal
vulnerability
lws affiliation
php
local file inclusion
nvd

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0

Percentile

10.5%

Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in LWS LWS Affiliation allows PHP Local File Inclusion.This issue affects LWS Affiliation: from n/a through 2.2.6.

Affected configurations

Vulners
Vulnrichment
Node
lwslws_cleanerRange2.2.6wordpress
VendorProductVersionCPE
lwslws_cleaner*cpe:2.3:a:lws:lws_cleaner:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "collectionURL": "https://wordpress.org/plugins",
    "defaultStatus": "unaffected",
    "packageName": "lws-affiliation",
    "product": "LWS Affiliation",
    "vendor": "LWS",
    "versions": [
      {
        "changes": [
          {
            "at": "2.3",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "2.2.6",
        "status": "affected",
        "version": "n/a",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0

Percentile

10.5%