Логотип exploitDog
bind:CVE-2023-6989
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-6989

Количество 3

Количество 3

nvd логотип

CVE-2023-6989

около 2 лет назад

The Shield Security – Smart Bot Blocking & Intrusion Prevention Security plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 18.5.9 via the render_action_template parameter. This makes it possible for unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-72xj-cfw6-3c4q

около 2 лет назад

The Shield Security – Smart Bot Blocking & Intrusion Prevention Security plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 18.5.9 via the render_action_template parameter. This makes it possible for unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files.

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2024-01090

около 2 лет назад

Уязвимость функций setTemplate(), renderPhp() и path_join() плагина Shield Security – Smart Bot Blocking & Intrusion Prevention Security системы управления содержимым сайта WordPress, позволяющая нарушителю загрузить произвольные PHP-файлы

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-6989

The Shield Security – Smart Bot Blocking & Intrusion Prevention Security plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 18.5.9 via the render_action_template parameter. This makes it possible for unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files.

CVSS3: 9.8
67%
Средний
около 2 лет назад
github логотип
GHSA-72xj-cfw6-3c4q

The Shield Security – Smart Bot Blocking & Intrusion Prevention Security plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 18.5.9 via the render_action_template parameter. This makes it possible for unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files.

CVSS3: 9.8
67%
Средний
около 2 лет назад
fstec логотип
BDU:2024-01090

Уязвимость функций setTemplate(), renderPhp() и path_join() плагина Shield Security – Smart Bot Blocking & Intrusion Prevention Security системы управления содержимым сайта WordPress, позволяющая нарушителю загрузить произвольные PHP-файлы

CVSS3: 9.8
67%
Средний
около 2 лет назад

Уязвимостей на страницу