cve/2023/CVE-2023-4724.md
2024-05-28 08:49:17 +00:00

20 lines
1.0 KiB
Markdown

### [CVE-2023-4724](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4724)
![](https://img.shields.io/static/v1?label=Product&message=Export%20any%20WordPress%20data%20to%20XML%2FCSV&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WP%20All%20Export%20Pro&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.4.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.8.6%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20('Code%20Injection')&color=brighgreen)
### Description
The Export any WordPress data to XML/CSV WordPress plugin before 1.4.0, WP All Export Pro WordPress plugin before 1.8.6 does not validate and sanitise the `wp_query` parameter which allows an attacker to run arbitrary command on the remote server
### POC
#### Reference
- https://wpscan.com/vulnerability/48820f1d-45cb-4f1f-990d-d132bfc5536f
#### Github
- https://github.com/dipa96/my-days-and-not