Lucene search

K
cvelistPatchstackCVELIST:CVE-2024-25096
HistoryApr 03, 2024 - 12:18 p.m.

CVE-2024-25096 WordPress canto plugin <= 3.0.7 - Unauth. Remote Code Execution (RCE) vulnerability

2024-04-0312:18:29
CWE-94
Patchstack
www.cve.org
6
cve-2024-25096
wordpress
canto
unauth remote code execution
code injection

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0

Percentile

9.0%

Improper Control of Generation of Code (‘Code Injection’) vulnerability in Canto Inc. Canto allows Code Injection.This issue affects Canto: from n/a through 3.0.7.

CNA Affected

[
  {
    "collectionURL": "https://wordpress.org/plugins",
    "defaultStatus": "unaffected",
    "packageName": "canto",
    "product": "Canto",
    "vendor": "Canto Inc.",
    "versions": [
      {
        "lessThanOrEqual": "3.0.7",
        "status": "affected",
        "version": "n/a",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0

Percentile

9.0%

Related for CVELIST:CVE-2024-25096