Lucene search

K
nvd[email protected]NVD:CVE-2023-5311
HistoryOct 25, 2023 - 6:17 p.m.

CVE-2023-5311

2023-10-2518:17:43
CWE-862
web.nvd.nist.gov
4
wordpress
wp extra plugin
unauthorized modification
missing capability check
remote code execution

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.7

Confidence

High

EPSS

0.002

Percentile

55.0%

The WP EXtra plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the register() function in versions up to, and including, 6.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to modify the contents of the .htaccess files located in a site’s root directory or /wp-content and /wp-includes folders and achieve remote code execution.

Affected configurations

Nvd
Node
wpvnteamwp_extraRange<6.3wordpress
VendorProductVersionCPE
wpvnteamwp_extra*cpe:2.3:a:wpvnteam:wp_extra:*:*:*:*:*:wordpress:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.7

Confidence

High

EPSS

0.002

Percentile

55.0%

Related for NVD:CVE-2023-5311