CVE-2023-0159

The Extensive VC Addons for WPBakery page builder WordPress plugin before 1.9.1 does not validate a parameter passed to the php extract function when loading templates, allowing an unauthenticated attacker to override the template path to read arbitrary files from the hosts file system. This may be escalated to RCE using PHP filter chains.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:wprealize:extensive_vc_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*

History

05 Dec 2023, 19:15

Type Values Removed Values Added
Summary The Extensive VC Addons for WPBakery page builder WordPress plugin before 1.9.1 does not validate a parameter passed to the php extract function when loading templates, allowing an unauthenticated attacker to override the template path to read arbitrary files from the hosts file system. The Extensive VC Addons for WPBakery page builder WordPress plugin before 1.9.1 does not validate a parameter passed to the php extract function when loading templates, allowing an unauthenticated attacker to override the template path to read arbitrary files from the hosts file system. This may be escalated to RCE using PHP filter chains.

07 Nov 2023, 03:59

Type Values Removed Values Added
CWE CWE-22

Information

Published : 2023-02-13 15:15

Updated : 2024-02-28 19:51


NVD link : CVE-2023-0159

Mitre link : CVE-2023-0159

CVE.ORG link : CVE-2023-0159


JSON object : View

Products Affected

wprealize

  • extensive_vc_addons_for_wpbakery_page_builder
CWE

No CWE.