2024-01-11 11:00:28 +00:00
{
"id" : "CVE-2023-6634" ,
"sourceIdentifier" : "security@wordfence.com" ,
"published" : "2024-01-11T09:15:50.437" ,
2025-06-03 16:03:55 +00:00
"lastModified" : "2025-06-03T14:15:38.520" ,
2024-12-08 03:06:42 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-01-11 11:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution."
2024-01-11 15:00:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "El complemento LearnPress para WordPress es vulnerable a la inyecci\u00f3n de comandos en todas las versiones hasta la 4.2.5.7 incluida a trav\u00e9s de la funci\u00f3n get_content. Esto se debe a que el complemento utiliza la funci\u00f3n call_user_func con la entrada del usuario. Esto hace posible que atacantes no autenticados ejecuten cualquier funci\u00f3n p\u00fablica con un par\u00e1metro, lo que podr\u00eda resultar en la ejecuci\u00f3n remota de c\u00f3digo."
2024-01-11 11:00:28 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-01-17 21:00:29 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "security@wordfence.com" ,
"type" : "Secondary" ,
2024-01-17 21:00:29 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 8.1 ,
"baseSeverity" : "HIGH" ,
2024-01-17 21:00:29 +00:00
"attackVector" : "NETWORK" ,
2024-12-08 03:06:42 +00:00
"attackComplexity" : "HIGH" ,
2024-01-17 21:00:29 +00:00
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-01-17 21:00:29 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 2.2 ,
2024-01-17 21:00:29 +00:00
"impactScore" : 5.9
} ,
2024-01-11 11:00:28 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2024-01-11 11:00:28 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2024-01-11 11:00:28 +00:00
"attackVector" : "NETWORK" ,
2024-12-08 03:06:42 +00:00
"attackComplexity" : "LOW" ,
2024-01-11 11:00:28 +00:00
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-01-11 11:00:28 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 3.9 ,
2024-01-11 11:00:28 +00:00
"impactScore" : 5.9
}
]
} ,
2024-01-17 21:00:29 +00:00
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-77"
}
]
2025-06-03 16:03:55 +00:00
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-77"
} ,
{
"lang" : "en" ,
"value" : "CWE-88"
}
]
2024-01-17 21:00:29 +00:00
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*" ,
"versionEndIncluding" : "4.2.5.7" ,
"matchCriteriaId" : "2D41E864-37EC-4FDB-96B2-66D91FE2828A"
}
]
}
]
}
] ,
2024-01-11 11:00:28 +00:00
"references" : [
{
"url" : "https://plugins.trac.wordpress.org/changeset/3013957/learnpress" ,
2024-01-17 21:00:29 +00:00
"source" : "security@wordfence.com" ,
"tags" : [
"Third Party Advisory"
]
2024-01-11 11:00:28 +00:00
} ,
{
"url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/21291ed7-cdc0-4698-9ec4-8417160845ed?source=cve" ,
2024-01-17 21:00:29 +00:00
"source" : "security@wordfence.com" ,
"tags" : [
"Third Party Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://plugins.trac.wordpress.org/changeset/3013957/learnpress" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/21291ed7-cdc0-4698-9ec4-8417160845ed?source=cve" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
2024-01-11 11:00:28 +00:00
}
]
}