Lucene search

K
cvelistWordfenceCVELIST:CVE-2023-5199
HistoryOct 30, 2023 - 1:48 p.m.

CVE-2023-5199

2023-10-3013:48:58
Wordfence
www.cve.org
1
wordpress
local file inclusion
remote code execution
plugin vulnerability
authentication bypass

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.5%

The PHP to Page plugin for WordPress is vulnerable Local File Inclusion to Remote Code Execution in versions up to, and including, 0.3 via the ‘php-to-page’ shortcode. This allows authenticated attackers with subscriber-level permissions or above, to include local file and potentially execute code on the server. While subscribers may need to poison log files or otherwise get a file installed in order to achieve remote code execution, author and above users can upload files by default and achieve remote code execution easily.

CNA Affected

[
  {
    "vendor": "bloafer",
    "product": "PHP to Page",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "0.3",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.5%

Related for CVELIST:CVE-2023-5199