CVE-2023-6635

The EditorsKit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation on the 'import_styles' function in versions up to, and including, 1.40.3. This makes it possible for authenticated attackers with administrator-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Configurations

Configuration 1 (hide)

cpe:2.3:a:extendify:editorskit:*:*:*:*:*:wordpress:*:*

History

12 Feb 2024, 20:50

Type Values Removed Values Added
CWE CWE-434
First Time Extendify editorskit
Extendify
CPE cpe:2.3:a:extendify:editorskit:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
References () https://plugins.trac.wordpress.org/changeset/3010794/block-options - () https://plugins.trac.wordpress.org/changeset/3010794/block-options - Patch
References () https://plugins.trac.wordpress.org/browser/block-options/tags/1.40.3/includes/addons/styles-manager/rest-api/gutenberghub-styles-import-export-controller.php#L100 - () https://plugins.trac.wordpress.org/browser/block-options/tags/1.40.3/includes/addons/styles-manager/rest-api/gutenberghub-styles-import-export-controller.php#L100 - Issue Tracking
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/4528f9a1-7027-4aa9-b006-bea84aa19c84?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/4528f9a1-7027-4aa9-b006-bea84aa19c84?source=cve - Third Party Advisory

05 Feb 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-05 22:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-6635

Mitre link : CVE-2023-6635

CVE.ORG link : CVE-2023-6635


JSON object : View

Products Affected

extendify

  • editorskit
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type