CVE-2023-0331

The Correos Oficial WordPress plugin through 1.2.0.2 does not have an authorization check user input validation when generating a file path, allowing unauthenticated attackers to download arbitrary files from the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:correos:correos_oficial:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:36

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/1b4dbaf3-1364-4103-9a7b-b5a1355c685b - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/1b4dbaf3-1364-4103-9a7b-b5a1355c685b - Exploit, Third Party Advisory

07 Nov 2023, 04:00

Type Values Removed Values Added
CWE CWE-552

Information

Published : 2023-02-27 16:15

Updated : 2024-11-21 07:36


NVD link : CVE-2023-0331

Mitre link : CVE-2023-0331

CVE.ORG link : CVE-2023-0331


JSON object : View

Products Affected

correos

  • correos_oficial
CWE

No CWE.