Lucene search

K
nvd[email protected]NVD:CVE-2023-2688
HistoryJun 09, 2023 - 6:16 a.m.

CVE-2023-2688

2023-06-0906:16:11
web.nvd.nist.gov
wordpress
file upload
path traversal
vulnerability
administrator-level
file upload pro
cve-2023-2688

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

5.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.6%

The WordPress File Upload and WordPress File Upload Pro plugins for WordPress are vulnerable to Path Traversal in versions up to, and including, 4.19.1 via the vulnerable parameter wfu_newpath. This allows administrator-level attackers to move files uploaded with the plugin (located in wp-content/uploads by default) outside of the web root.

Affected configurations

NVD
Node
iptanuswordpress_file_uploadRange4.19.1wordpress
OR
iptanuswordpress_file_upload_proRange4.19.1wordpress

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

5.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.6%

Related for NVD:CVE-2023-2688