Lucene search

K
cvelistWordfenceCVELIST:CVE-2023-6583
HistoryJan 11, 2024 - 8:32 a.m.

CVE-2023-6583

2024-01-1108:32:50
Wordfence
www.cve.org
wordpress
plugin
vulnerability
directory traversal
user import
security

6.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.6%

The Import and export users and customers plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.24.2 via the Recurring Import functionality. This makes it possible for authenticated attackers, with administrator access and above, to read and delete the contents of arbitrary files on the server including wp-config.php, which can contain sensitive information.

CNA Affected

[
  {
    "vendor": "carazo",
    "product": "Import and export users and customers",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.24.2",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

6.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.6%

Related for CVELIST:CVE-2023-6583