Lucene search

K
cvelistPatchstackCVELIST:CVE-2023-32095
HistoryDec 29, 2023 - 8:56 a.m.

CVE-2023-32095 WordPress Rename Media Files Plugin <= 1.0.1 is vulnerable to Remote Code Execution (RCE)

2023-12-2908:56:42
CWE-94
Patchstack
www.cve.org
wordpress
media files
plugin
cve-2023-32095
vulnerable
remote code execution
milan dinić
code injection

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.4%

Improper Control of Generation of Code (‘Code Injection’) vulnerability in Milan Dinić Rename Media Files.This issue affects Rename Media Files: from n/a through 1.0.1.

CNA Affected

[
  {
    "collectionURL": "https://wordpress.org/plugins",
    "defaultStatus": "unaffected",
    "packageName": "rename-media-files",
    "product": "Rename Media Files",
    "vendor": "Milan Dinić",
    "versions": [
      {
        "lessThanOrEqual": "1.0.1",
        "status": "affected",
        "version": "n/a",
        "versionType": "custom"
      }
    ]
  }
]

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.4%

Related for CVELIST:CVE-2023-32095