Lucene search

K
cvelistWordfenceCVELIST:CVE-2023-6160
HistoryNov 22, 2023 - 3:33 p.m.

CVE-2023-6160

2023-11-2215:33:26
Wordfence
www.cve.org
3
lifterlms
wordpress
directory traversal
vulnerability
csv files

CVSS3

3.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:L

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

19.0%

The LifterLMS – WordPress LMS Plugin for eLearning plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 7.4.2 via the maybe_serve_export function. This makes it possible for authenticated attackers, with administrator or LMS manager access and above, to read the contents of arbitrary CSV files on the server, which can contain sensitive information as well as removing those files from the server.

CNA Affected

[
  {
    "vendor": "chrisbadgett",
    "product": "LifterLMS – WordPress LMS Plugin for eLearning",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "7.4.2",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

3.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:L

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

19.0%

Related for CVELIST:CVE-2023-6160