Логотип exploitDog
bind:CVE-2023-4596
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-4596

Количество 3

Количество 3

nvd логотип

CVE-2023-4596

больше 2 лет назад

The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to file type validation occurring after a file has been uploaded to the server in the upload_post_image() function in versions up to, and including, 1.24.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-g9m5-p82f-mqgm

больше 2 лет назад

The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to file type validation occurring after a file has been uploaded to the server in the upload_post_image() function in versions up to, and including, 1.24.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

CVSS3: 9.8
EPSS: Критический
fstec логотип

BDU:2023-05225

больше 2 лет назад

Уязвимость функции upload_post_image() плагина Forminator системы управления содержимым сайта WordPress, позволяющая нарушителю обойти ограничения безопасности и выполнить произвольный код

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-4596

The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to file type validation occurring after a file has been uploaded to the server in the upload_post_image() function in versions up to, and including, 1.24.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

CVSS3: 9.8
93%
Критический
больше 2 лет назад
github логотип
GHSA-g9m5-p82f-mqgm

The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to file type validation occurring after a file has been uploaded to the server in the upload_post_image() function in versions up to, and including, 1.24.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

CVSS3: 9.8
93%
Критический
больше 2 лет назад
fstec логотип
BDU:2023-05225

Уязвимость функции upload_post_image() плагина Forminator системы управления содержимым сайта WordPress, позволяющая нарушителю обойти ограничения безопасности и выполнить произвольный код

CVSS3: 9.8
93%
Критический
больше 2 лет назад

Уязвимостей на страницу