Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5r22-g25f-j577

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

The parameters $cache_path, $wp_cache_debug_ip, $wp_super_cache_front_page_text, $cache_scheduled_time, $cached_direct_pages used in the settings of WP Super Cache WordPress plugin before 1.7.3 result in RCE because they allow input of '$' and '\n'. This is due to an incomplete fix of CVE-2021-24209.

The parameters $cache_path, $wp_cache_debug_ip, $wp_super_cache_front_page_text, $cache_scheduled_time, $cached_direct_pages used in the settings of WP Super Cache WordPress plugin before 1.7.3 result in RCE because they allow input of '$' and '\n'. This is due to an incomplete fix of CVE-2021-24209.

EPSS

Процентиль: 80%
0.01432
Низкий

7.2 High

CVSS3

Дефекты

CWE-78
CWE-94

Связанные уязвимости

CVSS3: 7.2
nvd
больше 4 лет назад

The parameters $cache_path, $wp_cache_debug_ip, $wp_super_cache_front_page_text, $cache_scheduled_time, $cached_direct_pages used in the settings of WP Super Cache WordPress plugin before 1.7.3 result in RCE because they allow input of '$' and '\n'. This is due to an incomplete fix of CVE-2021-24209.

EPSS

Процентиль: 80%
0.01432
Низкий

7.2 High

CVSS3

Дефекты

CWE-78
CWE-94