Логотип exploitDog
bind:CVE-2023-7082
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-7082

Количество 2

Количество 2

nvd логотип

CVE-2023-7082

около 2 лет назад

The Import any XML or CSV File to WordPress plugin before 3.7.3 accepts all zip files and automatically extracts the zip file into a publicly accessible directory without sufficiently validating the extracted file type. This may allows high privilege users such as administrator to upload an executable file type leading to remote code execution.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-p3c5-46w2-82qj

около 2 лет назад

The Import any XML or CSV File to WordPress plugin before 3.7.3 accepts all zip files and automatically extracts the zip file into a publicly accessible directory without sufficiently validating the extracted file type. This may allows high privilege users such as administrator to upload an executable file type leading to remote code execution.

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-7082

The Import any XML or CSV File to WordPress plugin before 3.7.3 accepts all zip files and automatically extracts the zip file into a publicly accessible directory without sufficiently validating the extracted file type. This may allows high privilege users such as administrator to upload an executable file type leading to remote code execution.

CVSS3: 7.2
4%
Низкий
около 2 лет назад
github логотип
GHSA-p3c5-46w2-82qj

The Import any XML or CSV File to WordPress plugin before 3.7.3 accepts all zip files and automatically extracts the zip file into a publicly accessible directory without sufficiently validating the extracted file type. This may allows high privilege users such as administrator to upload an executable file type leading to remote code execution.

CVSS3: 7.2
4%
Низкий
около 2 лет назад

Уязвимостей на страницу