cve/2023/CVE-2023-6634.md

20 lines
1016 B
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-6634](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6634)
![](https://img.shields.io/static/v1?label=Product&message=LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%204.2.5.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-88%20Argument%20Injection%20or%20Modification&color=brighgreen)
### Description
The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/krn966/CVE-2023-6634
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/toxyl/lscve