2024-01-08 21:00:28 +00:00
{
"id" : "CVE-2023-6140" ,
"sourceIdentifier" : "contact@wpscan.com" ,
"published" : "2024-01-08T19:15:10.027" ,
2024-09-04 18:03:19 +00:00
"lastModified" : "2024-09-04T16:35:05.610" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-01-08 21:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The Essential Real Estate WordPress plugin before 4.4.0 does not prevent users with limited privileges on the site, like subscribers, from momentarily uploading malicious PHP files disguised as ZIP archives, which may lead to remote code execution."
2024-01-11 21:00:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "El complemento Essential Real Estate de WordPress anterior a 4.4.0 no impide que los usuarios con privilegios limitados en el sitio, como los suscriptores, carguen moment\u00e1neamente archivos PHP maliciosos disfrazados de archivos ZIP, lo que puede provocar la ejecuci\u00f3n remota de c\u00f3digo."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.8 ,
2024-09-04 18:03:19 +00:00
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.8 ,
2024-01-11 21:00:28 +00:00
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-434"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:g5plus:essential_real_estate:*:*:*:*:*:wordpress:*:*" ,
"versionEndExcluding" : "4.4.0" ,
"matchCriteriaId" : "CB8E7130-A758-4F32-B03C-18B4B8BEB712"
}
]
}
]
2024-01-08 21:00:28 +00:00
}
] ,
"references" : [
{
"url" : "https://wpscan.com/vulnerability/c837eaf3-fafd-45a2-8f5e-03afb28a765b" ,
2024-01-11 21:00:28 +00:00
"source" : "contact@wpscan.com" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-01-08 21:00:28 +00:00
}
]
}