cve/2023/CVE-2023-4521.md

18 lines
998 B
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-4521](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4521)
![](https://img.shields.io/static/v1?label=Product&message=Import%20XML%20and%20RSS%20Feeds&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.1.4%3C%202.1.5%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20('Code%20Injection')&color=brighgreen)
### Description
The Import XML and RSS Feeds WordPress plugin before 2.1.5 contains a web shell, allowing unauthenticated attackers to perform RCE. The plugin/vendor was not compromised and the files are the result of running a PoC for a previously reported issue (https://wpscan.com/vulnerability/d4220025-2272-4d5f-9703-4b2ac4a51c42) and not deleting the created files when releasing the new version.
### POC
#### Reference
- https://wpscan.com/vulnerability/de2cdb38-3a9f-448e-b564-a798d1e93481
#### Github
No PoCs found on GitHub currently.