{ "id": "CVE-2023-5762", "sourceIdentifier": "contact@wpscan.com", "published": "2023-12-04T22:15:07.867", "lastModified": "2023-12-08T15:02:37.390", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Filr WordPress plugin before 1.2.3.6 is vulnerable from an RCE (Remote Code Execution) vulnerability, which allows the operating system to execute commands and fully compromise the server on behalf of a user with Author-level privileges." }, { "lang": "es", "value": "El complemento Filr de WordPress anterior a 1.2.3.6 es afectado por una vulnerabilidad RCE (ejecuci\u00f3n remota de c\u00f3digo), que permite al sistema operativo ejecutar comandos y comprometer completamente el servidor en nombre de un usuario con privilegios de nivel de autor." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-94" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:filr_project:filr:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.2.3.6", "matchCriteriaId": "C2FFFE90-079D-4732-99B6-8EED900EDF5C" } ] } ] } ], "references": [ { "url": "https://wpscan.com/vulnerability/6ad99725-eccc-4b61-bce2-668b62619deb", "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ] } ] }