{ "id": "CVE-2024-31011", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T05:15:48.010", "lastModified": "2024-04-03T12:38:04.840", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Arbitrary file write vulnerability in beescms v.4.0, allows a remote attacker to execute arbitrary code via a file path that was not isolated and the suffix was not verified in admin_template.php." }, { "lang": "es", "value": "Vulnerabilidad de escritura arbitraria en archivos en beescms v.4.0, permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una ruta de archivo que no estaba aislada y el sufijo no estaba verificado en admin_template.php." } ], "metrics": {}, "references": [ { "url": "https://github.com/ss122-0ss/beescms/blob/main/readme.md", "source": "cve@mitre.org" } ] }