Описание
An issue was discovered in the Divi Builder plugin, Divi theme, and Divi Extra theme before 4.5.3 for WordPress. Authenticated attackers, with contributor-level or above capabilities, can upload arbitrary files, including .php files. This occurs because the check for file extensions is on the client side.
Ссылки
- Broken LinkExploitThird Party Advisory
- ExploitThird Party Advisory
- Broken LinkExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 3.0 (включая) до 4.5.3 (исключая)Версия от 2.0 (включая) до 4.5.3 (исключая)Версия от 2.0 (включая) до 4.5.3 (исключая)
Одно из
cpe:2.3:a:elegantthemes:divi:*:*:*:*:*:wordpress:*:*
cpe:2.3:a:elegantthemes:divi_builder:*:*:*:*:*:wordpress:*:*
cpe:2.3:a:elegantthemes:extra:*:*:*:*:*:wordpress:*:*
EPSS
Процентиль: 84%
0.02232
Низкий
9.9 Critical
CVSS3
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-434
Связанные уязвимости
CVSS3: 8.8
github
больше 3 лет назад
An issue was discovered in the Divi Builder plugin, Divi theme, and Divi Extra theme before 4.5.3 for WordPress. Authenticated attackers, with contributor-level or above capabilities, can upload arbitrary files, including .php files. This occurs because the check for file extensions is on the client side.
EPSS
Процентиль: 84%
0.02232
Низкий
9.9 Critical
CVSS3
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-434