{ "id": "CVE-2024-31008", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T06:15:07.750", "lastModified": "2024-04-03T12:38:04.840", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in WUZHICMS version 4.1.0, allows an attacker to execute arbitrary code and obtain sensitive information via the index.php file." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en la versi\u00f3n 4.1.0 de WUZHICMS que permite a un atacante ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del archivo index.php." } ], "metrics": {}, "references": [ { "url": "https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0-Captcha%20bypass%20%28logic%20vulnerability%29.md", "source": "cve@mitre.org" } ] }