CVE-2023-6187
🟡 Monitoruj
Luka w wtyczce Paid Memberships Pro umożliwia atakującym przesyłanie dowolnych plików.
CVSS
7.5
EPSS
19.7%
Exploit
none
Vendor
strangerstudios
Opis źródłowy (NVD)
The Paid Memberships Pro plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'pmpro_paypalexpress_session_vars_for_user_fields' function in versions up to, and including, 2.12.3. This makes it possible for authenticated attackers with subscriber privileges or above, to upload arbitrary files on the affected site's server which may make remote code execution possible. This can be exploited if 2Checkout (deprecated since version 2.6) or PayPal Express is set as the payment method and a custom user field is added that is only visible at profile, and not visible at checkout according to its settings.
rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 19.7% |
| Opublikowano (NVD) | 2023-11-18 02:15:49 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 18:18:35 UTC |
Referencje
- https://plugins.trac.wordpress.org/browser/paid-memberships-pro/tags/2.12.3/includes/fields.php#L564 (security@wordfence.com) [Product]
- https://plugins.trac.wordpress.org/changeset/2997319/paid-memberships-pro/tags/2.12.4/includes/fields.php (security@wordfence.com) [Patch]
- https://plugins.trac.wordpress.org/changeset/2997319/paid-memberships-pro/tags/2.12.4/includes/functions.php (security@wordfence.com) [Patch]
- https://www.paidmembershipspro.com/pmpro-update-2-12-4/ (security@wordfence.com) [Product]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/5979f2eb-2ca8-4b06-814c-c4236bb81af0?source=cve (security@wordfence.com) [Patch, Third Party Advisory]