cve/2023/CVE-2023-6623.md

19 lines
927 B
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-6623](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6623)
![](https://img.shields.io/static/v1?label=Product&message=Essential%20Blocks&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%204.4.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen)
### Description
The Essential Blocks WordPress plugin before 4.4.3 does not prevent unauthenticated attackers from overwriting local variables when rendering templates over the REST API, which may lead to Local File Inclusion attacks.
### POC
#### Reference
- https://wpscan.com/blog/file-inclusion-vulnerability-fixed-in-essential-blocks-4-4-3/
- https://wpscan.com/vulnerability/633c28e0-0c9e-4e68-9424-55c32789b41f
#### Github
No PoCs found on GitHub currently.