Логотип exploitDog
bind:CVE-2023-6634
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-6634

Количество 3

Количество 3

nvd логотип

CVE-2023-6634

около 2 лет назад

The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution.

CVSS3: 8.1
EPSS: Критический
github логотип

GHSA-3jrv-ghj9-h744

около 2 лет назад

The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution.

CVSS3: 8.1
EPSS: Критический
fstec логотип

BDU:2024-05021

около 2 лет назад

Уязвимость функции call_user_func плагина LearnPress системы управления содержимым сайта WordPress, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-6634

The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution.

CVSS3: 8.1
92%
Критический
около 2 лет назад
github логотип
GHSA-3jrv-ghj9-h744

The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution.

CVSS3: 8.1
92%
Критический
около 2 лет назад
fstec логотип
BDU:2024-05021

Уязвимость функции call_user_func плагина LearnPress системы управления содержимым сайта WordPress, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
92%
Критический
около 2 лет назад

Уязвимостей на страницу