Lucene search

K
cvelistWordfenceCVELIST:CVE-2023-6559
HistoryDec 16, 2023 - 12:29 p.m.

CVE-2023-6559

2023-12-1612:29:16
Wordfence
www.cve.org
wordpress
file deletion
plugin vulnerability
site takeover
remote code execution

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

10 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.3%

The MW WP Form plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 5.0.3. This is due to the plugin not properly validating the path of an uploaded file prior to deleting it. This makes it possible for unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can make site takeover and remote code execution possible.

CNA Affected

[
  {
    "vendor": "inc2734",
    "product": "MW WP Form",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "5.0.3",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

10 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.3%

Related for CVELIST:CVE-2023-6559