Lucene search

K
vulnrichmentPatchstackVULNRICHMENT:CVE-2024-32523
HistoryMay 17, 2024 - 8:58 a.m.

CVE-2024-32523 WordPress Mailster plugin <= 4.0.6 - Unauthenticated Local File Inclusion vulnerability

2024-05-1708:58:28
CWE-22
Patchstack
github.com
wordpress
mailster
unauthenticated
local file inclusion
path traversal
everpress
php

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:L

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.5%

Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability in EverPress Mailster allows PHP Local File Inclusion.This issue affects Mailster: from n/a through 4.0.6.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Mailster",
    "vendor": "EverPress",
    "versions": [
      {
        "changes": [
          {
            "at": "4.0.7",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "4.0.6",
        "status": "affected",
        "version": "n/a",
        "versionType": "custom"
      }
    ]
  }
]

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:L

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.5%

Related for VULNRICHMENT:CVE-2024-32523