The FULL - Customer plugin for WordPress is vulnerable to Arbitrary File Upload via the /install-plugin REST route in versions up to, and including, 2.2.3 due to improper authorization. This allows authenticated attackers with subscriber-level permissions and above to execute code by installing plugins from arbitrary remote locations including non-repository sources onto the site, granted they are packaged as a valid WordPress plugin.
References
Configurations
History
21 Nov 2024, 08:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/browser/full-customer/tags/1.1.0/app/api/Plugin.php - Product | |
References | () https://plugins.trac.wordpress.org/browser/full-customer/tags/2.2.1/app/api/PluginInstallation.php - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/9799df3f-e34e-42a7-8a72-fa57682f7014?source=cve - Third Party Advisory |
14 Aug 2023, 15:36
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/9799df3f-e34e-42a7-8a72-fa57682f7014?source=cve - Third Party Advisory | |
References | (MISC) https://plugins.trac.wordpress.org/browser/full-customer/tags/1.1.0/app/api/Plugin.php - Product | |
References | (MISC) https://plugins.trac.wordpress.org/browser/full-customer/tags/2.2.1/app/api/PluginInstallation.php - Product | |
CPE | cpe:2.3:a:full:full_-_customer:*:*:*:*:*:wordpress:*:* | |
First Time |
Full full - Customer
Full |
|
CWE | CWE-434 |
09 Aug 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-09 04:15
Updated : 2024-11-21 08:34
NVD link : CVE-2023-4243
Mitre link : CVE-2023-4243
CVE.ORG link : CVE-2023-4243
JSON object : View
Products Affected
full
- full_-_customer
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type