cve/2023/CVE-2023-3155.md

18 lines
843 B
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-3155](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3155)
![](https://img.shields.io/static/v1?label=Product&message=WordPress%20Gallery%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%203.39%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties&color=brighgreen)
### Description
The WordPress Gallery Plugin WordPress plugin before 3.39 is vulnerable to Arbitrary File Read and Delete due to a lack of input parameter validation in the `gallery_edit` function, allowing an attacker to access arbitrary resources on the server.
### POC
#### Reference
- https://wpscan.com/vulnerability/5c8473f4-4b52-430b-9140-b81b0a0901da
#### Github
No PoCs found on GitHub currently.