Lucene search

K
cvelistWordfenceCVELIST:CVE-2024-7627
HistorySep 05, 2024 - 2:04 a.m.

CVE-2024-7627 Bit File Manager 6.0 - 6.5.5 - Unauthenticated Remote Code Execution via Race Condition

2024-09-0502:04:24
CWE-94
Wordfence
www.cve.org
2
vulnerability
bit file manager
wordpress
remote code execution
race condition
unauthenticated
file validation
guest user
administrator

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

23.6%

The Bit File Manager plugin for WordPress is vulnerable to Remote Code Execution in versions 6.0 to 6.5.5 via the ‘checkSyntax’ function. This is due to writing a temporary file to a publicly accessible directory before performing file validation. This makes it possible for unauthenticated attackers to execute code on the server if an administrator has allowed Guest User read permissions.

CNA Affected

[
  {
    "vendor": "bitpressadmin",
    "product": "Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress",
    "versions": [
      {
        "version": "6.0",
        "status": "affected",
        "lessThanOrEqual": "6.5.5",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

23.6%

Related for CVELIST:CVE-2024-7627