cvelist/2023/5xxx/CVE-2023-5762.json

80 lines
2.4 KiB
JSON
Raw Normal View History

2023-10-25 17:39:23 +00:00
{
2023-12-04 22:00:34 +00:00
"data_version": "4.0",
2023-10-25 17:39:23 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-5762",
2023-12-04 22:00:34 +00:00
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
2023-10-25 17:39:23 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-12-04 22:00:34 +00:00
"value": "The Filr WordPress plugin before 1.2.3.6 is vulnerable from an RCE (Remote Code Execution) vulnerability, which allows the operating system to execute commands and fully compromise the server on behalf of a user with Author-level privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-94 Improper Control of Generation of Code ('Code Injection')"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Filr",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "1.2.3.6"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/6ad99725-eccc-4b61-bce2-668b62619deb",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/6ad99725-eccc-4b61-bce2-668b62619deb"
2023-10-25 17:39:23 +00:00
}
]
2023-12-04 22:00:34 +00:00
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Dmtirii Ignatyev"
},
{
"lang": "en",
"value": "WPScan"
}
]
2023-10-25 17:39:23 +00:00
}