CVE-2023-5414
🟠 Łataj w tym tygodniu
Podatność w wtyczce Icegram Express dla WordPressa umożliwia atakującym odczytanie plików serwera.
CVSS
9.1
EPSS
2.1%
Exploit
none
Vendor
icegram
Opis źródłowy (NVD)
The Icegram Express plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 5.6.23 via the show_es_logs function. This allows administrator-level attackers to read the contents of arbitrary files on the server, which can contain sensitive information including those belonging to other sites, for example in shared hosting environments.
path-traversal
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.1 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 2.1% |
| Opublikowano (NVD) | 2023-10-20 07:15:17 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 18:18:26 UTC |
Referencje
- https://plugins.trac.wordpress.org/browser/email-subscribers/trunk/lite/includes/classes/class-email-subscribers-logs.php?rev=2919465#L28 (security@wordfence.com) [Patch]
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2977318%40email-subscribers%2Ftrunk&old=2972043%40email-subscribers%2Ftrunk&sfp_email=&sfph_mail=#file4 (security@wordfence.com) [Patch]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/417186ba-36ef-4d06-bbcd-e85eb9219689?source=cve (security@wordfence.com) [Third Party Advisory]