Lucene search

K
cveWPScanCVE-2024-6451
HistoryAug 19, 2024 - 6:15 a.m.

CVE-2024-6451

2024-08-1906:15:05
WPScan
web.nvd.nist.gov
24
ai engine
remote-code-execution
log poisoning
wordpress plugin
file extension validation
administrators

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.4

Confidence

High

EPSS

0

Percentile

9.5%

AI Engine < 2.4.3 is susceptible to remote-code-execution (RCE) via Log Poisoning. The AI Engine WordPress plugin before 2.5.1 fails to validate the file extension of “logs_path”, allowing Administrators to change log filetypes from .log to .php.

Affected configurations

Vulners
Vulnrichment
Node
meowappsai_engineRange<2.5.1wordpress
VendorProductVersionCPE
meowappsai_engine*cpe:2.3:a:meowapps:ai_engine:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "Unknown",
    "product": "AI Engine",
    "versions": [
      {
        "status": "affected",
        "versionType": "semver",
        "version": "0",
        "lessThan": "2.5.1"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.4

Confidence

High

EPSS

0

Percentile

9.5%

Related for CVE-2024-6451