CVE-2023-6827

The Essential Real Estate plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation on the 'ajaxUploadFonts' function in versions up to, and including, 4.3.5. This makes it possible for authenticated attackers with subscriber-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Configurations

Configuration 1 (hide)

cpe:2.3:a:g5plus:essential_real_estate:*:*:*:*:*:wordpress:*:*

History

21 Dec 2023, 04:48

Type Values Removed Values Added
First Time G5plus essential Real Estate
G5plus
CWE CWE-434
CPE cpe:2.3:a:g5plus:essential_real_estate:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
References () https://plugins.trac.wordpress.org/browser/essential-real-estate/tags/4.3.5/lib/smart-framework/core/fonts/fonts.class.php#L524 - () https://plugins.trac.wordpress.org/browser/essential-real-estate/tags/4.3.5/lib/smart-framework/core/fonts/fonts.class.php#L524 - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/8bb2ce22-077b-41dd-a2ff-cc1db9d20d38?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/8bb2ce22-077b-41dd-a2ff-cc1db9d20d38?source=cve - Third Party Advisory
References () https://plugins.trac.wordpress.org/changeset/3009780/essential-real-estate - () https://plugins.trac.wordpress.org/changeset/3009780/essential-real-estate - Patch

15 Dec 2023, 13:42

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-15 08:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-6827

Mitre link : CVE-2023-6827

CVE.ORG link : CVE-2023-6827


JSON object : View

Products Affected

g5plus

  • essential_real_estate
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type