Lucene search

K
cvelistPatchstackCVELIST:CVE-2023-47843
HistoryApr 18, 2024 - 10:58 a.m.

CVE-2023-47843 WordPress CataBlog Plugin <= 1.7.0 is vulnerable to Arbitrary File Deletion

2024-04-1810:58:34
CWE-22
Patchstack
www.cve.org
2
wordpress
catablog
vulnerable
arbitrary file deletion
path traversal

CVSS3

7.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:H

EPSS

0

Percentile

10.5%

Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in Zachary Segal CataBlog.This issue affects CataBlog: from n/a through 1.7.0.

CNA Affected

[
  {
    "collectionURL": "https://wordpress.org/plugins/catablog/",
    "defaultStatus": "unaffected",
    "packageName": "catablog",
    "product": "CataBlog",
    "vendor": "Zachary Segal",
    "versions": [
      {
        "lessThanOrEqual": "1.7.0",
        "status": "affected",
        "version": "n/a",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:H

EPSS

0

Percentile

10.5%

Related for CVELIST:CVE-2023-47843